![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Mohamed Rahouti
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Mohamed Rahouti, Hamza Drid, Khaled Hamouid, Karima Massmi, Sif Eddine Mehenna:
Brave-sdn: blockchain-reliant authentication for versatile east-west bound in distributed SDNs. Int. J. Inf. Sec. 24(1): 51 (2025) - [j23]Ali Alfatemi, Mohamed Rahouti, D. Frank Hsu, Christina Schweikert, Nasir Ghani, Aiman Solyman, Mohammad Iqbal Saryuddin Assaqty:
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis. J. Netw. Syst. Manag. 33(1): 8 (2025) - [i23]Lamya Benaddi, Charaf Ouaddi, Adnane Souha, Abdeslam Jakimi, Mohamed Rahouti, Mohammed Aledhari, Diogo Oliveira, Brahim Ouchao:
Seq2Seq Model-Based Chatbot with LSTM and Attention Mechanism for Enhanced User Interaction. CoRR abs/2501.00049 (2025) - [i22]Fernando Martinez-Lopez, Lesther Santana, Mohamed Rahouti:
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks. CoRR abs/2501.00050 (2025) - 2024
- [j22]Roohallah Alizadehsani
, Solomon Sunday Oyelere
, Sadiq Hussain
, Senthil Kumar Jagatheesaperumal
, Rene Ripardo Calixto, Mohamed Rahouti
, Mohamad Roshanzamir, Victor Hugo C. de Albuquerque
:
Explainable Artificial Intelligence for Drug Discovery and Development: A Comprehensive Survey. IEEE Access 12: 35796-35812 (2024) - [j21]Mohamed Amine Ould Rabah
, Hamza Drid
, Yasmine Medjadba
, Mohamed Rahouti
:
Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture. IEEE Access 12: 128929-128940 (2024) - [j20]Collins Chimezie Obidiagha
, Mohamed Rahouti
, Thaier Hayajneh
:
DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware Detection. IEEE Access 12: 156285-156306 (2024) - [j19]Mohammed Aledhari, Mohamed Rahouti
, Junaid Qadir, Basheer Qolomany
, Mohsen Guizani
, Ala I. Al-Fuqaha
:
Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques. IEEE Internet Things J. 11(1): 378-402 (2024) - [j18]Nordine Quadar, Mohamed Rahouti, Moussa Ayyash, Senthil Kumar Jagatheesaperumal
, Abdellah Chehri:
IoT-AI/Machine Learning Experimental Testbeds: The Missing Piece. IEEE Internet Things Mag. 7(1): 136-143 (2024) - [j17]Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Ali Alfatemi, Nasir Ghani, Vu Khanh Quy, Abdellah Chehri:
Enabling Trustworthy Federated Learning in Industrial IoT: Bridging the Gap Between Interpretability and Robustness. IEEE Internet Things Mag. 7(5): 38-44 (2024) - [j16]Mohamed Amine Ould Rabah, Hamza Drid, Mohamed Rahouti, Nadjib Lazaar:
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency. J. Netw. Syst. Manag. 32(4): 90 (2024) - [j15]Tao Hai, Md. Zakirul Alam Bhuiyan
, Mohamed Rahouti
, Jincheng Zhou
, Jian Shen
:
Blockchain-Based Trustworthiness in Cross-Border Data Exchange in 5G-Powered Intelligent Connected Vehicles. IEEE Netw. 38(6): 90-97 (2024) - [j14]Jan Bieniek, Mohamed Rahouti
, Kaiqi Xiong, Gabriel Ferreira Araújo:
SecureCare: A blockchain-assisted wearable body area network for secure and scalable IoT healthcare services. Secur. Priv. 7(6) (2024) - [c30]Nasim Paykari, Damian M. Lyons, Mohamed Rahouti:
RoboStake: Pioneering Cooperative Navigation with a Novel Blockchain-Powered Proof-of-Stake in Robotic Teams. COINS 2024: 1-4 - [c29]Fernando Martinez
, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani:
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach. ICCCN 2024: 1-9 - [c28]Xueqing Zhang, Junkai Zhang, Ka-Ho Chow, Juntao Chen, Ying Mao, Mohamed Rahouti, Xiang Li, Yuchen Liu, Wenqi Wei:
Demo: Visualizing the Shadows: Unveiling Data Poisoning Behaviors in Federated Learning. ICDCS 2024: 1431-1434 - [c27]Ali Alfatemi, Sarah A. L. Jamal, Nasim Paykari, Mohamed Rahouti, Ruhul Amin, Abdellah Chehri:
Refining Bird Species Identification through GAN-Enhanced Data Augmentation and Deep Learning Models. KES 2024: 548-557 - [c26]Ali Alfatemi, Sarah A. L. Jamal, Nasim Paykari, Mohamed Rahouti, Abdellah Chehri:
Multi-Label Classification with Deep Learning and Manual Data Collection for Identifying Similar Bird Species. KES 2024: 558-565 - [c25]Ali Alfatemi, Diogo Oliveira, Mohamed Rahouti, Abdelatif Hafid, Nasir Ghani:
Precision DDoS Detection through Gaussian Noise-Augmented Neural Networks. NoF 2024: 178-185 - [c24]Diogo Oliveira, Richard K. Lomotey, Madhurima Ray, Mohamed Rahouti:
Memory Feature Engineering for Performance-Gain in Obfuscated Malware Detection Using Machine Learning and Sensitivity Analysis. PACRIM 2024: 1-6 - [c23]Damian M. Lyons, Mohamed Rahouti:
Improving Multi-Robot Visual Navigation Using Cooperative Consensus. UR 2024: 299-305 - [c22]Lesther Santana, Paul Badu Yakubu, Evans Owusu, Mohamed Rahouti, Abdellah Chehri, Kaiqi Xiong, Yufeng Xin:
Exploring Feature Importance and Explainability Towards Enhanced ML-Based DoS Detection in AI Systems. VTC Fall 2024: 1-5 - [i21]Ali Alfatemi, Mohamed Rahouti, Ruhul Amin, Sarah ALJamal, Kaiqi Xiong, Yufeng Xin:
Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling. CoRR abs/2401.03116 (2024) - [i20]Xueqing Zhang, Junkai Zhang, Ka-Ho Chow, Juntao Chen, Ying Mao, Mohamed Rahouti, Xiang Li, Yuchen Liu, Wenqi Wei:
Visualizing the Shadows: Unveiling Data Poisoning Behaviors in Federated Learning. CoRR abs/2405.16707 (2024) - [i19]Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani:
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach. CoRR abs/2406.02632 (2024) - [i18]Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost:
Nonlinear Transformations Against Unlearnable Datasets. CoRR abs/2406.02883 (2024) - [i17]Abdelatif Hafid, Maad Ebrahim, Ali Alfatemi, Mohamed Rahouti, Diogo Oliveira:
Cryptocurrency Price Forecasting Using XGBoost Regressor and Technical Indicators. CoRR abs/2407.11786 (2024) - [i16]Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Ali Alfatemi, Nasir Ghani, Vu Khanh Quy, Abdellah Chehri:
Enabling Trustworthy Federated Learning in Industrial IoT: Bridging the Gap Between Interpretability and Robustness. CoRR abs/2409.02127 (2024) - [i15]Mohammed Aledhari, Mohamed Rahouti:
Gene and RNA Editing: Methods, Enabling Technologies, Applications, and Future Directions. CoRR abs/2409.09057 (2024) - [i14]Nasim Paykari, Razieh Jokar, Ali Alfatemi, Damian M. Lyons, Mohamed Rahouti:
Optimizing Control Strategies for Wheeled Mobile Robots Using Fuzzy Type I and II Controllers and Parallel Distributed Compensation. CoRR abs/2409.17161 (2024) - [i13]Abdelatif Hafid, Mohamed Rahouti, Linglong Kong, Maad Ebrahim, Mohamed Adel Serhani:
Predicting Bitcoin Market Trends with Enhanced Technical Indicator Integration and Classification Models. CoRR abs/2410.06935 (2024) - [i12]Paul Badu Yakubu, Evans Owusu, Lesther Santana, Mohamed Rahouti, Abdellah Chehri, Kaiqi Xiong:
Exploring Feature Importance and Explainability Towards Enhanced ML-Based DoS Detection in AI Systems. CoRR abs/2411.03355 (2024) - [i11]Mohammed Aledhari, Mohamed Rahouti, Ali Alfatemi:
Towards Equitable ASD Diagnostics: A Comparative Study of Machine and Deep Learning Models Using Behavioral and Facial Data. CoRR abs/2411.05880 (2024) - [i10]Jan Bieniek, Mohamed Rahouti, D. C. Verma:
Generative AI in Multimodal User Interfaces: Trends, Challenges, and Cross-Platform Adaptability. CoRR abs/2411.10234 (2024) - 2023
- [j13]Mohamed Rahouti
, Damian M. Lyons
, Senthil Kumar Jagatheesaperumal
, Kaiqi Xiong
:
A Decentralized Cooperative Navigation Approach for Visual Homing Networks. IT Prof. 25(6): 71-81 (2023) - [j12]Ahlem Menaceur, Hamza Drid, Mohamed Rahouti:
Fault Tolerance and Failure Recovery Techniques in Software-Defined Networking: A Comprehensive Approach. J. Netw. Syst. Manag. 31(4): 83 (2023) - [c21]Xirong Cao, Mohamed Rahouti, Senthil Kumar Jagatheesaperumal
, Kaiqi Xiong:
Psychological Information Sharing Using Ethereum Blockchain and Smart Contracts. BCCA 2023: 561-568 - [c20]Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong
, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis. CNS 2023: 1-6 - [c19]Shujun Zhao, Lesther Santana, Evans Owusu, Mohamed Rahouti, Kaiqi Xiong
, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 Poster. CNS 2023: 1-2 - [c18]Damian M. Lyons, Mohamed Rahouti:
WAVN: Wide Area Visual Navigation for Large-scale, GPS-denied Environments. ICRA 2023: 2039-2045 - [c17]Damian M. Lyons, Mohamed Rahouti:
An Approach to Cooperative, Wide Area Visual Navigation by Leveraging Blockchain Consensus. IRC 2023: 79-83 - [c16]Nasim Paykari, Damian M. Lyons, Mohamed Rahouti:
Assessing Blockchain Consensus in Robotics: A Visual Homing Approach. UEMCON 2023: 577-583 - [c15]Fernando Martinez, Mohamed Rahouti, Abdellah Chehri, Ruhul Amin, Nasir Ghani:
Rediscovering Fraud Detection in Bitcoin Transactions Using Machine Learning Models. WF-IoT 2023: 1-6 - [i9]Mohammed Aledhari, Mohamed Rahouti, Junaid Qadir, Basheer Qolomany, Mohsen Guizani, Ala I. Al-Fuqaha:
Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques. CoRR abs/2306.09462 (2023) - [i8]Roohallah Alizadehsani, Sadiq Hussain, Rene Ripardo Calixto, Victor Hugo C. de Albuquerque, Mohamad Roshanzamir, Mohamed Rahouti, Senthil Kumar Jagatheesaperumal
:
Explainable Artificial Intelligence for Drug Discovery and Development - A Comprehensive Survey. CoRR abs/2309.12177 (2023) - [i7]Mohamed Rahouti, Damian M. Lyons, Senthil Kumar Jagatheesaperumal
, Kaiqi Xiong:
A Decentralized Cooperative Navigation Approach for Visual Homing Networks. CoRR abs/2310.00906 (2023) - [i6]Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, A. Selcuk Uluagac, Mohamed Rahouti, Elias Bou-Harb, Morteza Safaei Pour:
Ransomware Detection Using Federated Learning with Imbalanced Datasets. CoRR abs/2311.07760 (2023) - [i5]Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis. CoRR abs/2312.00006 (2023) - [i4]Senthil Kumar Jagatheesaperumal
, Mohamed Rahouti, Kaiqi Xiong, Abdellah Chehri, Nasir Ghani, Jan Bieniek:
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach. CoRR abs/2312.06928 (2023) - 2022
- [j11]Mohamed Rahouti
, Kaiqi Xiong
, Yufeng Xin, Senthil Kumar Jagatheesaperumal
, Moussa Ayyash
, Maliha Shaheed:
SDN Security Review: Threat Taxonomy, Implications, and Open Challenges. IEEE Access 10: 45820-45854 (2022) - [j10]Mohammed A. Jasim
, Nazli Siasi
, Mohamed Rahouti
, Nasir Ghani
:
SFC Provisioning With Load Balancing Method in Multi-Tier Fog Networks. IEEE Netw. Lett. 4(2): 82-86 (2022) - [j9]Senthil Kumar Jagatheesaperumal
, Mohamed Rahouti
, Kashif Ahmad
, Ala I. Al-Fuqaha
, Mohsen Guizani
:
The Duo of Artificial Intelligence and Big Data for Industry 4.0: Applications, Techniques, Challenges, and Future Research Directions. IEEE Internet Things J. 9(15): 12861-12885 (2022) - [j8]Senthil Kumar Jagatheesaperumal
, Mohamed Rahouti
:
Building Digital Twins of Cyber Physical Systems With Metaverse for Industry 5.0 and Beyond. IT Prof. 24(6): 34-40 (2022) - [j7]Kevin Martin, Mohamed Rahouti
, Moussa Ayyash
, Izzat Alsmadi
:
Anomaly detection in blockchain using network representation and machine learning. Secur. Priv. 5(2) (2022) - [c14]Malcolm Smith, Alexander Castro, Mohamed Rahouti, Moussa Ayyash, Lesther Santana:
ScreenCoin: A Blockchain-Enabled Decentralized Ad Network. COINS 2022: 1-6 - [c13]Mohamed Rahouti
, Kaiqi Xiong, Jing Lin:
Developing Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud. ICCSE (3) 2022: 438-448 - [c12]Zhengxin Qi, Mohamed Rahouti, Mohammed A. Jasim, Nazli Siasi:
Music Genre Classification and Feature Comparison using ML. ICMLT 2022: 42-50 - [i3]Mohamed Rahouti, Damian M. Lyons, Lesther Santana:
VRChain: A Blockchain-Enabled Framework for Visual Homing and Navigation Robots. CoRR abs/2206.11223 (2022) - 2021
- [j6]Mohamed Rahouti
, Kaiqi Xiong
, Yufeng Xin:
Secure Software-Defined Networking Communication Systems for Smart Cities: Current Status, Challenges, and Trends. IEEE Access 9: 12083-12113 (2021) - [j5]Mohamed Rahouti, Kaiqi Xiong, Nasir Ghani, Farooq Shaikh:
SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks. IET Networks 10(2): 76-87 (2021) - [j4]Mohamed Rahouti, Moussa Ayyash, Senthil Kumar Jagatheesaperumal, Diogo Oliveira:
Incremental Learning Implementations and Vision for Cyber Risk Detection in IoT. IEEE Internet Things Mag. 4(3): 114-119 (2021) - [c11]Mohamed Rahouti, Kaiqi Xiong
, Yufeng Xin, Nasir Ghani:
A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. CCNC 2021: 1-2 - [c10]Diogo Oliveira, Mohamed Rahouti, Adrian Jaesim, Nazli Siasi, Leslie Ko:
Can the Inter Planetary File System Become an Alternative to Centralized Architectures? IHIET (Paris) 2021: 597-604 - [c9]Mohamed Rahouti, Kaiqi Xiong
, Yufeng Xin, Nasir Ghani:
QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. IPCCC 2021: 1-7 - [i2]Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kashif Ahmad, Ala I. Al-Fuqaha, Mohsen Guizani:
The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review of Applications, Techniques, Challenges, and Future Research Directions. CoRR abs/2104.02425 (2021) - [i1]Jing Lin, Long Dang, Mohamed Rahouti, Kaiqi Xiong:
ML Attack Models: Adversarial Attacks and Data Poisoning Attacks. CoRR abs/2112.02797 (2021) - 2020
- [c8]Kevin Martin, Izzat Alsmadi, Mohamed Rahouti, Moussa Ayyash:
Combining Blockchain and Machine Learning to Forecast Cryptocurrency Prices. BCCA 2020: 52-58 - [c7]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin:
Prototyping an SDN Control Framework for QoS Guarantees. TRIDENTCOM 2020: 3-16
2010 – 2019
- 2019
- [j3]Farooq Shaikh, Mohamed Rahouti
, Nasir Ghani, Kaiqi Xiong
, Elias Bou-Harb, Jamal Haque:
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems. IEEE Access 7: 63164-63180 (2019) - [c6]Mohamed Rahouti, Kaiqi Xiong
:
A Customized Educational Booster for Online Students in Cybersecurity Education. CSEDU (2) 2019: 535-541 - [c5]Mohamed Rahouti, Kaiqi Xiong, Tommy Chin, Peizhao Hu, Diogo Oliveira:
A Preemption-Based Timely Software Defined Networking Framework for Emergency Response Traffic Delivery. HPCC/SmartCity/DSS 2019: 452-459 - [c4]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani:
LatencySmasher: A Software-Defined Networking-Based Framework for End-to-End Latency Optimization. LCN 2019: 202-209 - [c3]Diogo Oliveira, Mahsa Pourvali, Jorge Crichigno
, Elias Bou-Harb, Mohamed Rahouti, Nasir Ghani:
An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure Scenarios. SDS 2019: 123-129 - 2018
- [j2]Mohamed Rahouti, Kaiqi Xiong
, Nasir Ghani:
Bitcoin Concepts, Threats, and Machine-Learning Security Solutions. IEEE Access 6: 67189-67205 (2018) - [j1]Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:
Kernel-Space Intrusion Detection Using Software-Defined Networking. EAI Endorsed Trans. Security Safety 5(15): e2 (2018) - 2017
- [c2]Tommy Chin, Mohamed Rahouti, Kaiqi Xiong:
End-to-End Delay Minimization Approaches Using Software-Defined Networking. RACS 2017: 184-189 - [c1]Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:
SDN-Based Kernel Modular Countermeasure for Intrusion Detection. SecureComm 2017: 270-290
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-08 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint