default search action
Mai Abdelhakim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Akshay Madan, David Tipper, Balaji Palanisamy, Mai Abdelhakim, Prashant Krishnamurthy, Vinay Chamola:
BLE-based sensors for privacy-enabled contagious disease monitoring with zero trust architecture. Ad Hoc Networks 167: 103693 (2025) - 2024
- [c16]Liou Tang, Prashant Krishnamurthy, Mai Abdelhakim:
Is Machine Learning the Best Option for Network Routing? ICC 2024: 5425-5430 - [i5]Matthew Karlson, Heng Ban, Daniel G. Cole, Mai Abdelhakim, Jennifer Forsythe, John T. Fitzgibbons:
Analyzing Errors in Controlled Turret System. CoRR abs/2408.16870 (2024) - [i4]Matthew Karlson, Heng Ban, Daniel G. Cole, Mai Abdelhakim, Jennifer Forsythe:
Analyzing Errors in Controlled Turret System Given Target Location Input from Artificial Intelligence Methods in Automatic Target Recognition. CoRR abs/2408.16923 (2024) - 2022
- [j12]Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim:
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. IEEE Trans. Dependable Secur. Comput. 19(4): 2304-2317 (2022) - 2021
- [j11]Faris Alotibi, Mai Abdelhakim:
Anomaly Detection for Cooperative Adaptive Cruise Control in Autonomous Vehicles Using Statistical Learning and Kinematic Model. IEEE Trans. Intell. Transp. Syst. 22(6): 3468-3478 (2021) - [c15]Eli Brock, Lauren Bruckstein, Patrick M. Connor, Sabrina Nguyen, Robert Kerestes, Mai Abdelhakim:
An application of reinforcement learning to residential energy storage under real-time pricing. ISGT Asia 2021: 1-5 - [i3]Leila Karimi, Mai Abdelhakim, James Joshi:
Adaptive ABAC Policy Learning: A Reinforcement Learning Approach. CoRR abs/2105.08587 (2021) - [i2]Eli Brock, Lauren Bruckstein, Patrick M. Connor, Sabrina Nguyen, Robert Kerestes, Mai Abdelhakim:
An application of reinforcement learning to residential energy storage under real-time pricing. CoRR abs/2111.11367 (2021) - 2020
- [c14]Nuray Baltaci Akhuseyinoglu, Maryam Karimi, Mai Abdelhakim, Prashant Krishnamurthy:
On Automated Trust Computation in IoT with Multiple Attributes and Subjective Logic. LCN 2020: 267-278 - [i1]Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim:
An Automatic Attribute Based Access Control Policy Extraction from Access Logs. CoRR abs/2003.07270 (2020)
2010 – 2019
- 2019
- [j10]Assem M. Abdelhakim, Hassan Ibrahim Saleh, Mai Abdelhakim:
Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multim. Tools Appl. 78(22): 32523-32563 (2019) - [c13]Faris Alotibi, Mai Abdelhakim:
Anomaly Detection in Cooperative Adaptive Cruise Control Using Physics Laws and Data Fusion. VTC Fall 2019: 1-7 - 2018
- [j9]Assem M. Abdelhakim, Mai Abdelhakim:
A time-efficient optimization for robust image watermarking using machine learning. Expert Syst. Appl. 100: 197-210 (2018) - [j8]Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper:
Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning. Open J. Internet Things 4(1): 109-125 (2018) - [c12]Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper:
Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning. ICC 2018: 1-6 - [c11]Mai Abdelhakim, Xin Liu, Prashant Krishnamurthy:
Diversity for Detecting Routing Attacks in Multihop Networks. ICNC 2018: 712-717 - 2017
- [j7]Vladimir Zadorozhny, Prashant Krishnamurthy, Mai Abdelhakim, Konstantinos Pelechrinis, Jiawei Xu:
Data Credence in IoT: Vision and Challenges. Open J. Internet Things 3(1): 114-126 (2017) - [j6]Mai Abdelhakim, Yuan Liang, Tongtong Li:
Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis. IEEE Trans. Signal Inf. Process. over Networks 3(1): 172-186 (2017) - 2016
- [j5]Mai Abdelhakim, Yuan Liang, Tongtong Li:
Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions. IEEE J. Sel. Areas Commun. 34(5): 1663-1675 (2016) - 2015
- [c10]Mai Abdelhakim, Zhaoxi Fang, Jian Ren, Tongtong Li:
Hybrid mobile access coordinated wireless sensor networks - Design and analysis. ChinaSIP 2015: 453-457 - [c9]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Reliable Communications over Multihop Networks under Routing Attacks. GLOBECOM 2015: 1-6 - 2014
- [j4]Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE Trans. Inf. Forensics Secur. 9(5): 772-781 (2014) - [j3]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. IEEE Trans. Parallel Distributed Syst. 25(4): 950-959 (2014) - [j2]Tongtong Li, Mai Abdelhakim, Jian Ren:
N-Hop networks: a general framework for wireless systems. IEEE Wirel. Commun. 21(2): 98-105 (2014) - [c8]Mai Abdelhakim, Jian Ren, Tongtong Li:
Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. GLOBECOM 2014: 4616-4621 - 2013
- [j1]Mai Abdelhakim, Mohammed Nafie, Ahmed F. Shalash, Ayman Elezabi:
Adaptive Bit Loading and Puncturing Using Long Single Codewords in OFDM Systems. Wirel. Pers. Commun. 71(2): 1557-1576 (2013) - [c7]Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. GLOBECOM 2013: 3229-3234 - [c6]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Architecture design of mobile access coordinated wireless sensor networks. ICC 2013: 1720-1724 - 2012
- [c5]Mai Abdelhakim, Jian Ren, Tongtong Li:
Reliable OFDM system design under hostile multi-tone jamming. GLOBECOM 2012: 4290-4295 - [c4]Mai Abdelhakim, Jian Ren, Tongtong Li:
Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper). WASA 2012: 206-217 - 2011
- [c3]Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li:
Cooperative sensing in cognitive networks under malicious attack. ICASSP 2011: 3004-3007 - [c2]Mai Abdelhakim, Leonard E. Lightfoot, Tongtong Li:
Reliable data fusion in wireless sensor networks under Byzantine attacks. MILCOM 2011: 810-815
2000 – 2009
- 2009
- [c1]Mai Abdelhakim, Mohammed H. Nafie, Ahmed F. Shalash, Ayman Elezabi:
Adaptive Puncturing for Coded OFDMA Systems. ICC 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint