default search action
Fathi H. Amsaad 0001
Person information
- affiliation: Wright State University, Dayton, OH, USA
- affiliation (former): Eastern Michigan University (EMU), School of Information Security and Applied Computing, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Niraj Prasad Bhatta, Harshdeep Singh, Ashutosh Ghimire, Fathi H. Amsaad:
Analyzing Aging Effects on SRAM PUFs: Implications for Security and Reliability. J. Hardw. Syst. Secur. 8(3): 174-186 (2024) - [j16]Ashutosh Ghimire, Fathi H. Amsaad:
A Parallel Approach to Enhance the Performance of Supervised Machine Learning Realized in a Multicore Environment. Mach. Learn. Knowl. Extr. 6(3): 1840-1856 (2024) - [c36]Mohammed Alkurdi, Ashutosh Ghimire, Fathi H. Amsaad:
Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection Technique. ISVLSI 2024: 313-318 - [c35]Niraj Prasad Bhatta, Fathi H. Amsaad:
Advancing PUF Security Machine Learning Assisted Modeling Attacks. ISVLSI 2024: 805-808 - [c34]Harshdeep Singh, Fathi H. Amsaad:
Enhancing Supply Chain Security: ML Assisted Manufacturer Identification of SRAM PUFs. ISVLSI 2024: 812-816 - [c33]Niraj Prasad Bhatta, Usha Giri, Fathi Amsaad:
Machine Learning-Based Classification of Hardware Trojans Using Power Side-Channel Signals. MWSCAS 2024: 990-994 - [c32]Ahmed T. El-Toukhy, Islam Elgarhy, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Mohamed I. Ibrahem, Fathi Amsaad:
Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks. SmartNets 2024: 1-6 - [c31]Ashutosh Ghimire, Mahommed Alkurdi, Fathi Amsaad:
Enhancing Hardware Trojan Security through Reference-Free Clustering using Representatives. VLSID 2024: 467-473 - [i5]K. M. Tawsik Jawad, Anusha Verma, Fathi Amsaad:
AI-Driven Predictive Analytics Approach for Early Prognosis of Chronic Kidney Disease Using Ensemble Learning and Explainable AI. CoRR abs/2406.06728 (2024) - [i4]Anusha Verma, Ghazal Ghajari, K. M. Tawsik Jawad, Hugh P. Salehi, Fathi H. Amsaad:
Real-Time Automated donning and doffing detection of PPE based on Yolov4-tiny. CoRR abs/2407.17471 (2024) - [i3]Ghazal Ghajari, Mithun Kumar PK, Fathi H. Amsaad:
Hybrid Efficient Unsupervised Anomaly Detection for Early Pandemic Case Identification. CoRR abs/2408.05347 (2024) - 2023
- [j15]Shorouq Al-Eidi, Fathi Amsaad, Omar A. Darwish, Yahya M. Tashtoush, Ali Alqahtani, Niveshitha Niveshitha:
Comparative Analysis Study for Air Quality Prediction in Smart Cities Using Regression Techniques. IEEE Access 11: 115140-115149 (2023) - [j14]Brian Hildebrand, Mohamed Baza, Tara Salman, Simra Tabassum, Bharath Konatham, Fathi H. Amsaad, Abdul Razaque:
A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions. Comput. Sci. Rev. 48: 100547 (2023) - [j13]Abdul Razaque, Gulnara Bektemyssova, Joon Yoo, Aziz Alotaibi, Mohsin Ali, Fathi Amsaad, Amanzholova Saule Toksanovna, Majid Alshammari:
Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors 23(14): 6554 (2023) - [c30]Fathi Amsaad, Shorouq Al-Eidi, Omar Darwish:
Comparative Analysis of Sequential and Parallel Computing for Object Detection Using Deep Learning Model. ACIT 2023: 1-5 - [c29]Fathi Amsaad, P. L. Prasanna, T. Pravallika, G. Mamatha, B. Raviteja, M. Lakshmi, Nasser Alsaadi, Abdul Razaque, Yahya M. Tashtoush:
Toward Secure and Efficient CNN Recognition with Different Activation and Optimization Functions. ACR 2023: 550-568 - [c28]Vishnu Vardhan Baligodugula, Fathi Amsaad, Varshitha Vunnam Tadepalli, Vojjala Radhika, Yetukuri Sanjana, Sai Shiva, Supriya Meduri, Majdi Maabreh, Naser Alsaadi, Omar A. Darwish, Abdul Razaque, Yahya M. Tashtoush:
A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications. ACR 2023: 569-586 - [c27]Harshdeep Singh, Vishnu Vardhan Baligodugula, Fathi H. Amsaad:
Shrew Distributed Denial-of-Service (DDoS) Attack in IoT Applications: A Survey. IFIPIoT (1) 2023: 97-103 - [c26]Niraj Prasad Bhatta, Ashutosh Ghimire, Al Amin Hossain, Fathi Amsaad:
Comprehensive Survey of Machine Learning Techniques for Detecting and Preventing Network Layer DoS Attacks. IFIPIoT (2) 2023: 347-356 - [c25]Ashutosh Ghimire, Vishnu Vardhan Baligodugula, Fathi Amsaad:
Power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques. IFIPIoT (2) 2023: 357-367 - [c24]Ashutosh Ghimire, Fathi H. Amsaad, Tamzidul Hoque, Kenneth M. Hopkinson, Md. Tauhidur Rahman:
Unsupervised IC Security with Machine Learning for Trojan Detection. MWSCAS 2023: 20-24 - [c23]Niraj Prasad Bhatta, Harshdeep Singh, Fathi H. Amsaad:
Benchmarking for Hardware Security: Types, Design Levels, and Limitations. MWSCAS 2023: 1088-1092 - 2022
- [j12]Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Fathi H. Amsaad, Ansagan Manasov, Salim Hariri, Banu B. Yergaliyeva, Aziz Alotaibi:
Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection. IEEE Access 10: 3144-3163 (2022) - [j11]Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad, Abdul Razaque:
Light Weight Authentication Scheme for Smart Home IoT Devices. Cryptogr. 6(3): 37 (2022) - [j10]Abdul Razaque, Fathi H. Amsaad, Musbah Abdulgader, Bandar Alotaibi, Fawaz Alsolami, Duisen Gulsezim, Saraju P. Mohanty, Salim Hariri:
A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare. IEEE Internet Things J. 9(22): 22434-22452 (2022) - [j9]Abdul Razaque, Yaser Jararweh, Aziz Alotaibi, Fathi H. Amsaad, Bandar Alotaibi, Munif Alotaibi:
A blockchain-enabled framework for securing connected consumer electronics against wireless attacks. Simul. Model. Pract. Theory 121: 102652 (2022) - [i2]Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaque, Abdullah Alourani:
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions. CoRR abs/2203.10708 (2022) - 2021
- [j8]Fathi H. Amsaad, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Selçuk Köse, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security. IEEE Access 9: 136792-136810 (2021) - [j7]Fathi H. Amsaad, Selçuk Köse:
A Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities. IEEE Consumer Electron. Mag. 10(4): 106-112 (2021) - [j6]Fathi H. Amsaad, Selçuk Köse:
A Secure Lightweight Hardware-Assisted Charging Coordination Authentication Framework for Trusted Smart Grid Energy Storage Units. SN Comput. Sci. 2(6): 444 (2021) - [c22]Mohamed Baza, Ramy Amer, Fathi Amsaad, Mohamed Mahmoud, Waleed Alasmary:
Efficient Privacy-preserving Charging Coordination with Linkability-resistance in the Smart Grid. GLOBECOM (Workshops) 2021: 1-5 - [c21]Fathi H. Amsaad, Abdul Razaque, Mohamed Baza, Selçuk Köse, Sajal Bhatia, Gautam Srivastava:
An Efficient and Reliable Lightweight PUF for IoT-based Applications. ICC Workshops 2021: 1-6 - [c20]Abdul Razaque, Fathi H. Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, Sajal Bhatia:
Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms. IEA/AIE (1) 2021: 396-412 - [c19]Ibrahim Yilmaz, Mohamed Baza, Ramy Amer, Amar A. Rasheed, Fathi H. Amsaad, Rasha Morsi:
On the Assessment of Robustness of Telemedicine Applications against Adversarial Machine Learning Attacks. IEA/AIE (1) 2021: 519-529 - [c18]Ahmed Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed Alasmary, Fathi H. Amsaad:
Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks. ISNCC 2021: 1-7 - [c17]Dipal Halder, Fathi H. Amsaad, Nicolas Fourty, Brian Hildebrand:
A Low-Power IoT-enabled Smart Monitoring System for Efficient Product Delivery. MWSCAS 2021: 692-695 - [c16]Fathi H. Amsaad, Selçuk Köse:
A Lightweight Hardware-based Authentication for Secure Smart Grid Energy Storage Units. WF-IoT 2021: 443-448 - 2020
- [j5]Abdul Razaque, Fathi H. Amsaad, Salim Hariri, Marwah Almasri, Syed S. Rizvi, Mohamed Ben Haj Frej:
Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider. IEEE Access 8: 80812-80826 (2020) - [j4]Ahmed Shafee, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Abdulah Jeza Aljohani, Waleed Alasmary, Fathi H. Amsaad:
Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning. IEEE Access 8: 179400-179414 (2020) - [c15]Abdul Razaque, Fathi H. Amsaad, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf M. Ganda, Majdi Rawashdeh, Amer Al-Rahayfeh:
Efficient Context-aware File System Approach. SDS 2020: 226-230 - [c14]Abdul Razaque, Fathi H. Amsaad, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahamed, Ayman Al-Dmour, Meer Jaro Khan, Raouf M. Ganda:
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data. SDS 2020: 231-234 - [c13]Fathi H. Amsaad, Selçuk Köse:
A Trusted Authentication Scheme for IoT-based Smart Grid Applications. WF-IoT 2020: 1-6 - [i1]Ahmed Shafee, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Abdulah Jeza Aljohani, Fathi Amsaad:
Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning. CoRR abs/2005.13813 (2020)
2010 – 2019
- 2019
- [j3]Abdul Razaque, Fathi H. Amsaad, Meer Jaro Khan, Salim Hariri, Shujing Chen, Chen Siting, Xingchen Ji:
Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain. IEEE Access 7: 168774-168797 (2019) - [c12]Nurbek Tastan, Abdul Razaque, Mohamed Ben Haj Frej, Amanzholova Saule Toksanovna, Raouf M. Ganda, Fathi H. Amsaad:
Burglary Detection Framework for House Crime Control. ICCSA (7) 2019: 152-157 - [c11]Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad, Muder Almiani, Raouf M. Ganda, Ahmed Oun:
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. IoTSMS 2019: 405-411 - [c10]Abdul Razaque, A. Kanapina, M. Sailaubek, Dana Tsoy, Z. Turganov, Muder Almiani, Fathi H. Amsaad, Mohammad Adnan Almahamed:
Pair Data Division Algorithm For Handling Data Classification. SNAMS 2019: 316-320 - 2018
- [j2]Fathi Amsaad, Mohammed Y. Niamat, Amer Dawoud, Selçuk Köse:
Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks. Inf. 9(9): 224 (2018) - [j1]Mahmood J. Azhar, Fathi Amsaad, Selçuk Köse:
Duty-Cycle-Based Controlled Physical Unclonable Function. IEEE Trans. Very Large Scale Integr. Syst. 26(9): 1647-1658 (2018) - [p1]Fathi Amsaad, Nitin Pundir, Mohammed Y. Niamat:
A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks. Computer and Network Security Essentials 2018: 407-425 - 2017
- [c9]Nitin Pundir, Fathi Amsaad, Muhtadi Choudhury, Mohammed Y. Niamat:
Novel technique to improve strength of weak arbiter PUF. MWSCAS 2017: 1532-1535 - 2016
- [c8]Abdul Razaque, Fathi H. Amsaad, Musbah Abdulgader, Vijay Chand Mannava, Ibrahim Elwarfalli, Pavan Teja Kilari:
Automatic Tampering Detection Paradigm to Support Personal Health Record. CHASE 2016: 388-393 - [c7]Niraj, Ankit Trivedi, Abdul Razaque, Fathi H. Amsaad, Musbah Abdulgader:
Efficient allocation of slot using Medium Access Control protocol. EIT 2016: 105-110 - [c6]Abdul Razaque, Savitesh Jain, M. N. K. Sai Santosh Irrinki, Fathi H. Amsaad, Musbah Abdulgader, Niraj:
Simultaneous Priority and Detection based Carrier Sense Multiple Access protocol. EIT 2016: 111-116 - [c5]Abdul Razaque, Peter Oddo, Fathi H. Amsaad, Mohit Sangavikar, Sushil Manchikatla, Niraj:
Power reduction for Smart Homes in an Internet of Things framework. EIT 2016: 117-121 - [c4]Abdul Razaque, Prudhvi Sagar Sreeramoju, Fathi H. Amsaad, Chaitanya Kumar Nerella, Musbah Abdulgader, Harsha Saranu:
Multi-biometric system using Fuzzy Vault. EIT 2016: 122-126 - [c3]Fathi Amsaad, Atul Prasad, Chayanika Roychaudhuri, Mohammed Y. Niamat:
A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys. HOST 2016: 185-190 - 2015
- [c2]Fathi Amsaad, Tamzidul Hoque, Mohammed Y. Niamat:
Analyzing the performance of a configurable ROPUF design controlled by programmable XOR gates. MWSCAS 2015: 1-4 - [c1]Tamzidul Hoque, Muslim Mustapa, Fathi Amsaad, Mohammed Y. Niamat:
Assessment of NAND based ring oscillator for hardware Trojan detection. MWSCAS 2015: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint