default search action
Muhamad Felemban
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Muhamad Felemban, Mustafa Ghaleb, Kunwar Muhammed Saaim, Saleh Alsaleh, Ahmad Almulhem:
File Fragment Type Classification Using Light-Weight Convolutional Neural Networks. IEEE Access 12: 157179-157191 (2024) - [j9]Nourah S. AlOtaibi, Muhamad Felemban, Sajjad Mahmood:
Edge-Assisted Label-Flipping Attack Detection in Federated Learning. IEEE Open J. Commun. Soc. 5: 7278-7300 (2024) - 2023
- [c10]Muath Alghamdi, Mohammed Abushawarib, Mahmoud Ellouh, Mustafa Ghaleb, Muhamad Felemban:
Enhancing Arabic Information Retrieval for Question Answering. ICFNDS 2023: 366-371 - [c9]Ahcène Bounceur, Mohammad Hammoudeh, Jameleddine Hassine, Madani Bezoui, Adel Fadhl Ahmed, Muhamad Felemban:
RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning. ICFNDS 2023: 611-617 - [c8]Soha B. Sandouka, Muhamad Felemban:
Leveraging Federated Learning for File Fragments Classification Based on Depthwise Separable Convolutions. ICFNDS 2023: 626-632 - [i5]Mustafa Ghaleb, Kunwar Muhammed Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem:
File Fragment Classification using Light-Weight Convolutional Neural Networks. CoRR abs/2305.00656 (2023) - 2022
- [j8]Anas Daghistani, Mosab Khayat, Muhamad Felemban, Walid G. Aref, Arif Ghafoor:
Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems. IEEE Trans. Dependable Secur. Comput. 19(6): 4172-4186 (2022) - [c7]Asaad Alghamdi, Younes Balah, Mohammad Albejadi, Muhamad Felemban:
BeeCast: A Device-to-Device Collaborative Video Streaming System. IWCMC 2022: 178-183 - [c6]Kunwar Muhammed Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem:
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions. SEC 2022: 196-211 - 2021
- [j7]Sani Umar, Muhamad Felemban:
Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems. Sensors 21(7): 2478 (2021) - [c5]Sani Umar, Muhamad Felemban, Yahya E. Osais:
Advanced Persistent False Data Injection Attacks Against Optimal Power Flow in Power Systems. IWCMC 2021: 469-474 - 2020
- [j6]Yahya Javed, Muhamad Felemban, Tawfeeq A. Shawly, Jason Kobes, Arif Ghafoor:
A Partition-Driven Integrated Security Architecture for Cyberphysical Systems. Computer 53(3): 47-56 (2020) - [c4]Asaad Alghamdi, Younes Balah, Mohammad Albejadi, Muhamad Felemban:
BeeCast: a collaborative video streaming system. MobiCom 2020: 63:1-63:3 - [i4]Muhamad Felemban, Anas Daghistani, Yahya Javed, Jason Kobes, Arif Ghafoor:
A Security and Performance Driven Architecture for Cloud Data Centers. CoRR abs/2003.12598 (2020)
2010 – 2019
- 2019
- [j5]Anis Elgabli, Muhamad Felemban, Vaneet Aggarwal:
GiantClient: Video HotSpot for Multi-User Streaming. IEEE Trans. Circuits Syst. Video Technol. 29(9): 2833-2843 (2019) - [j4]Muhammad Umer Arshad, Muhamad Felemban, Zahid Pervaiz, Arif Ghafoor, Walid G. Aref:
A Privacy Mechanism for Access Controlled Graph Data. IEEE Trans. Dependable Secur. Comput. 16(5): 819-832 (2019) - [j3]Muhamad Felemban, Emad A. Felemban, Jason Kobes, Arif Ghafoor:
Threat Management in Data-centric IoT-Based Collaborative Systems. ACM Trans. Internet Techn. 19(3): 42:1-42:19 (2019) - [j2]Anis Elgabli, Muhamad Felemban, Vaneet Aggarwal:
GroupCast: Preference-Aware Cooperative Video Streaming With Scalable Video Coding. IEEE/ACM Trans. Netw. 27(3): 1138-1150 (2019) - [i3]Yahya Javed, Muhamad Felemban, Tawfeeq A. Shawly, Jason Kobes, Arif Ghafoor:
A Partition-Driven Integrated Security Architecture for Cyber-Physical Systems. CoRR abs/1901.03018 (2019) - 2018
- [b1]Muhamad Felemban:
Design and Development of Adaptive Intrusion Management for Cyber-Based Systems. Purdue University, USA, 2018 - [i2]Anis Elgabli, Muhamad Felemban, Vaneet Aggarwal:
GroupCast: Preference-Aware Cooperative Video Streaming with Scalable Video Coding. CoRR abs/1809.10998 (2018) - [i1]Muhamad Felemban, Yahya Javed, Jason Kobes, Thamir Qadah, Arif Ghafoor, Walid G. Aref:
Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems. CoRR abs/1810.02061 (2018) - 2016
- [c3]Adil A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar:
Challenges and opportunities for underwater sensor networks. IIT 2016: 1-6 - 2013
- [j1]Muhamad Felemban, Saleh M. Basalamah, Arif Ghafoor:
A distributed cloud architecture for mobile multimedia services. IEEE Netw. 27(5): 20-27 (2013) - [c2]Muhamad Felemban, Basem Shihada, Kamran Jamshaid:
Optimal Node Placement in Underwater Wireless Sensor Networks. AINA 2013: 492-499 - [c1]Muhamad Felemban, Emad A. Felemban:
Energy-delay tradeoffs for Underwater Acoustic Sensor Networks. BlackSeaCom 2013: 45-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint