Aiman Erbad
Aiman Erbad
Professor, Qatar University
Verified email at - Homepage
Cited by
Cited by
Security services using blockchains: A state of the art survey
T Salman, M Zolanvari, A Erbad, R Jain, M Samaka
IEEE communications surveys & tutorials 21 (1), 858-880, 2018
Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers
K Bilal, O Khalid, A Erbad, SU Khan
Computer Networks 130, 94-120, 2018
A survey on service function chaining
D Bhamare, R Jain, M Samaka, A Erbad
Journal of Network and Computer Applications 75, 138-155, 2016
Cybersecurity for Industrial Control Systems: A Survey
D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan, N Meskin
Computers & Security 89, 101677, 2020
Edge Computing For Smart Health: Context-aware Approaches, Opportunities, and Challenges
AA Abdellatif, A Mohamed, CF Chiasserini, M Tlili, A Erbad
IEEE Network, 2019
Optimal virtual network function placement in multi-cloud service function chaining architecture
D Bhamare, M Samaka, A Erbad, R Jain, L Gupta, HA Chan
Computer Communications 102, 1-16, 2017
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
MF Al-Sa’d, A Al-Ali, A Mohamed, T Khattab, A Erbad
Future Generation Computer Systems 100, 86-97, 2019
MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange
AA Abdellatif, L Samara, A Mohamed, A Erbad, CF Chiasserini, M Guizani, ...
IEEE Internet of Things Journal, 2021
Edge computing for interactive media and video streaming
K Bilal, A Erbad
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
Machine learning for anomaly detection and categorization in multi-cloud environments
T Salman, D Bhamare, A Erbad, R Jain, M Samaka
2017 IEEE 4th international conference on cyber security and cloud computing …, 2017
Feasibility of supervised machine learning for cloud security
D Bhamare, T Salman, M Samaka, A Erbad, R Jain
2016 International Conference on Information Science and Security (ICISS), 1-5, 2016
Optimal User-Edge Assignment in Hierarchical Federated Learning based on Statistical Properties and Network Topology Constraints
N Mhaisen, A Awad, A Mohamed, A Erbad, M Guizani
IEEE Transactions on Network Science and Engineering, 2021
ssHealth: toward secure, blockchain-enabled healthcare systems
AA Abdellatif, AZ Al-Marridi, A Mohamed, A Erbad, CF Chiasserini, ...
IEEE Network 34 (4), 312-319, 2020
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad
Computers & Security 89, 101684, 2020
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification
MHDS Allahham, MF Al-Sa'd, A Al-Ali, A Mohamed, T Khattab, A Erbad
Data in brief 26, 104313, 2019
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
AA Abdellatif, N Mhaisen, A Mohamed, A Erbad, M Guizani, Z Dawy, ...
Future Generation Computer Systems 128, 406-419, 2022
Pervasive AI for IoT applications: A Survey on Resource-efficient Distributed Artificial Intelligence
E Baccour, N Mhaisen, AA Abdellatif, A Erbad, A Mohamed, M Hamdi, ...
IEEE Communications Surveys & Tutorials, 2022
Machine learning techniques for network anomaly detection: A survey
S Eltanbouly, M Bashendy, N AlNaimi, Z Chkirbene, A Erbad
2020 IEEE International Conference on Informatics, IoT, and Enabling …, 2020
TIDCS: A dynamic intrusion detection and classification system based feature selection
Z Chkirbene, A Erbad, R Hamila, A Mohamed, M Guizani, M Hamdi
IEEE access 8, 95864-95877, 2020
Blockchain technologies to mitigate COVID-19 challenges: A scoping review
AA Abd-alrazaq, M Alajlani, D Alhuwail, A Erbad, A Giannicchi, Z Shah, ...
Computer Methods and Programs in Biomedicine Update 1, 100001, 2020
The system can't perform the operation now. Try again later.
Articles 1–20