


default search action
Mohammad Abu Alsheikh
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Nguyen Quang Hieu
, Dinh Thai Hoang
, Diep N. Nguyen
, Mohammad Abu Alsheikh
:
Reconstructing Human Pose From Inertial Measurements: A Generative Model-Based Compressive Sensing Approach. IEEE J. Sel. Areas Commun. 42(10): 2674-2687 (2024) - [c11]Hamoud Alhazmi, Ahmed Imran, Mohammad Abu Alsheikh:
Perception of Digital Privacy Protection: An Empirical Study using GDPR Framework. ACIS 2024 - [c10]Dany Duong, Hamed Sarbazhosseini, Mohammad Abu Alsheikh, Wanli Ma:
Conceptualising People, Process, Technology, Data, Governance and Continuous Improvement (2PTDGC) as a Framework to Explore the Cybersecurity Awareness and Process of Australian Medical Practices. ACIS 2024 - [i22]Md Arif Hassan, Mohammad Behdad Jamshidi, Bui Duc Manh, Nam Hoai Chu
, Chi-Hieu Nguyen, Nguyen Quang Hieu, Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen
, Nguyen Van Huynh, Mohammad Abu Alsheikh, Eryk Dutkiewicz
:
Enabling Technologies for Web 3.0: A Comprehensive Survey. CoRR abs/2401.10901 (2024) - [i21]Tran Viet Khoa, Mohammad Abu Alsheikh, Yibeltal Alem, Dinh Thai Hoang:
Balancing Security and Accuracy: A Novel Federated Learning Approach for Cyberattack Detection in Blockchain Networks. CoRR abs/2409.04972 (2024) - [i20]Hamoud Alhazmi, Ahmed Imran, Mohammad Abu Alsheikh:
Perception of Digital Privacy Protection: An Empirical Study using GDPR Framework. CoRR abs/2411.12223 (2024) - 2023
- [j10]Mohammad Abu Alsheikh
:
Five Common Misconceptions About Privacy-Preserving Internet of Things. IEEE Commun. Mag. 61(5): 151-157 (2023) - [i19]Mohammad Abu Alsheikh:
Five Common Misconceptions About Privacy-Preserving Internet of Things. CoRR abs/2301.00920 (2023) - [i18]Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen
, Mohammad Abu Alsheikh:
Reconstructing Human Pose from Inertial Measurements: A Generative Model-based Compressive Sensing Approach. CoRR abs/2310.20228 (2023) - 2022
- [j9]Hamoud Alhazmi, Ahmed Imran
, Mohammad Abu Alsheikh
:
How Do Socio-Demographic Patterns Define Digital Privacy Divide? IEEE Access 10: 11296-11307 (2022) - [i17]Hamoud Alhazmi, Ahmed Imran, Mohammad Abu Alsheikh:
How Do Socio-Demographic Patterns Define Digital Privacy Divide? CoRR abs/2201.07936 (2022) - 2021
- [i16]Hamoud Alhazmi, Ahmed Imran, Mohammad Abu Alsheikh:
Digital Divide and Social Dilemma of Privacy Preservation. CoRR abs/2110.02669 (2021) - 2020
- [j8]Mohammad Abu Alsheikh
, Dinh Thai Hoang
, Dusit Niyato
, Derek Leong, Ping Wang
, Zhu Han
:
Optimal Pricing of Internet of Things: A Machine Learning Approach. IEEE J. Sel. Areas Commun. 38(4): 669-684 (2020) - [j7]Dinh Thai Hoang, Diep N. Nguyen
, Mohammad Abu Alsheikh
, Shimin Gong, Eryk Dutkiewicz
, Dusit Niyato
, Zhu Han:
"Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks. IEEE Wirel. Commun. 27(3): 79-87 (2020) - [i15]Mohammad Abu Alsheikh, Dinh Thai Hoang, Dusit Niyato, Derek Leong, Ping Wang, Zhu Han:
Optimal Pricing of Internet of Things: A Machine Learning Approach. CoRR abs/2002.05929 (2020)
2010 – 2019
- 2019
- [c9]Dinh Thai Hoang, Mohammad Abu Alsheikh
, Shimin Gong, Dusit Niyato, Zhu Han, Ying-Chang Liang
:
Defend Jamming Attacks: How to Make Enemies Become Friends. GLOBECOM 2019: 1-6 - [i14]Dinh Thai Hoang, Diep N. Nguyen
, Mohammad Abu Alsheikh, Shimin Gong, Eryk Dutkiewicz
, Dusit Niyato, Zhu Han:
"Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks. CoRR abs/1912.11170 (2019) - 2018
- [c8]Mingmin Zhao
, Tianhong Li, Mohammad Abu Alsheikh
, Yonglong Tian, Hang Zhao, Antonio Torralba, Dina Katabi:
Through-Wall Human Pose Estimation Using Radio Signals. CVPR 2018: 7356-7365 - [c7]Mingmin Zhao
, Yonglong Tian, Hang Zhao, Mohammad Abu Alsheikh
, Tianhong Li, Rumen Hristov, Zachary Kabelac, Dina Katabi, Antonio Torralba:
RF-based 3D skeletons. SIGCOMM 2018: 267-281 - 2017
- [b1]Mohammad Abu Alsheikh:
A framework for big sensor data collection and trading. Nanyang Technological University, Singapore, 2017 - [j6]Mohammad Abu Alsheikh
, Yutao Jiao, Dusit Niyato
, Ping Wang, Derek Leong
, Zhu Han:
The Accuracy-Privacy Trade-off of Mobile Crowdsensing. IEEE Commun. Mag. 55(6): 132-139 (2017) - [j5]Mohammad Abu Alsheikh
, Dusit Niyato
, Derek Leong
, Ping Wang, Zhu Han:
Privacy Management and Optimal Pricing in People-Centric Sensing. IEEE J. Sel. Areas Commun. 35(4): 906-920 (2017) - [j4]Mohammad Abu Alsheikh
, Dusit Niyato
, Shaowei Lin, Hwee-Pink Tan
, Dong In Kim:
Fast Adaptation of Activity Sensing Policies in Mobile Devices. IEEE Trans. Veh. Technol. 66(7): 5995-6008 (2017) - [c6]Yutao Jiao, Ping Wang, Dusit Niyato
, Mohammad Abu Alsheikh
, Shaohan Feng
:
Profit Maximization Auction and Data Management in Big Data Markets. WCNC 2017: 1-6 - [i13]Mohammad Abu Alsheikh, Yutao Jiao, Dusit Niyato, Ping Wang, Derek Leong, Zhu Han:
The Accuracy-Privacy Tradeoff of Mobile Crowdsensing. CoRR abs/1702.04565 (2017) - [i12]Mohammad Abu Alsheikh, Dusit Niyato, Derek Leong, Ping Wang, Zhu Han:
Privacy Management and Optimal Pricing in People-Centric Sensing. CoRR abs/1703.00807 (2017) - [i11]Yutao Jiao, Ping Wang, Dusit Niyato, Mohammad Abu Alsheikh, Shaohan Feng:
Profit Maximization Auction and Data Management in Big Data Markets. CoRR abs/1704.01260 (2017) - 2016
- [j3]Mohammad Abu Alsheikh
, Dusit Niyato
, Shaowei Lin, Hwee-Pink Tan
, Zhu Han:
Mobile big data analytics using deep learning and apache spark. IEEE Netw. 30(3): 22-29 (2016) - [c5]Mohammad Abu Alsheikh, Ahmed Selim, Dusit Niyato, Linda Doyle, Shaowei Lin, Hwee-Pink Tan:
Deep Activity Recognition Models with Triaxial Accelerometers. AAAI Workshop: Artificial Intelligence Applied to Assistive Technologies and Smart Environments 2016 - [c4]Dusit Niyato
, Mohammad Abu Alsheikh
, Ping Wang, Dong In Kim, Zhu Han:
Market model and optimal pricing scheme of big data and Internet of Things (IoT). ICC 2016: 1-6 - [i10]Dusit Niyato, Mohammad Abu Alsheikh, Ping Wang, Dong In Kim, Zhu Han:
Market Model and Optimal Pricing Scheme of Big Data and Internet of Things (IoT). CoRR abs/1602.03202 (2016) - [i9]Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Zhu Han:
Mobile Big Data Analytics Using Deep Learning and Apache Spark. CoRR abs/1602.07031 (2016) - [i8]Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan:
Rate-distortion Balanced Data Compression for Wireless Sensor Networks. CoRR abs/1604.00736 (2016) - [i7]Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim:
Fast Adaptation of Activity Sensing Policies in Mobile Devices. CoRR abs/1611.03202 (2016) - 2015
- [j2]Mohammad Abu Alsheikh
, Dinh Thai Hoang, Dusit Niyato
, Hwee-Pink Tan
, Shaowei Lin:
Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutorials 17(3): 1239-1267 (2015) - [c3]Mohammad Abu Alsheikh
, Shaowei Lin, Hwee Pink Tan, Dusit Niyato
:
Toward a robust sparse data representation for wireless sensor networks. LCN 2015: 117-124 - [i6]Mohammad Abu Alsheikh, Dinh Thai Hoang, Dusit Niyato, Hwee-Pink Tan, Shaowei Lin:
Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey. CoRR abs/1501.00644 (2015) - [i5]Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato:
Toward a Robust Sparse Data Representation for Wireless Sensor Networks. CoRR abs/1508.00230 (2015) - [i4]Mohammad Abu Alsheikh, Ahmed Selim, Dusit Niyato, Linda Doyle, Shaowei Lin, Hwee Pink Tan:
Deep Activity Recognition Models with Triaxial Accelerometers. CoRR abs/1511.04664 (2015) - 2014
- [j1]Mohammad Abu Alsheikh
, Shaowei Lin, Dusit Niyato
, Hwee Pink Tan
:
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. IEEE Commun. Surv. Tutorials 16(4): 1996-2018 (2014) - [c2]Mohammad Abu Alsheikh
, Puay Kai Poh, Shaowei Lin, Hwee Pink Tan
, Dusit Niyato
:
Efficient data compression with error bound guarantee in wireless sensor networks. MSWiM 2014: 307-311 - [c1]Mohammad Abu Alsheikh
, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato
:
Area coverage under low sensor density. SECON 2014: 173-175 - [i3]Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato:
Area Coverage Under Low Sensor Density. CoRR abs/1405.4378 (2014) - [i2]Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan:
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. CoRR abs/1405.4463 (2014) - [i1]Mohammad Abu Alsheikh, Puay Kai Poh, Shaowei Lin, Hwee Pink Tan, Dusit Niyato:
Efficient Data Compression with Error Bound Guarantee in Wireless Sensor Networks. CoRR abs/1408.2948 (2014)
Coauthor Index
aka: Hwee-Pink Tan

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint