default search action
Abdulrahman Alzahrani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Sana Alazwari, Majdy M. Eltahir, Nabil Sharaf Almalki, Abdulrahman Alzahrani, Mrim M. Alnfiai, Ahmed S. Salama:
Improved Coyote Optimization Algorithm and Deep Learning Driven Activity Recognition in Healthcare. IEEE Access 12: 22158-22166 (2024) - [j18]Latifah Almuqren, Mohammed Maray, Faiz Abdullah Alotaibi, Abdulrahman Alzahrani, Ahmed Mahmud, Mohammed Rizwanullah:
Optimal Deep Learning Empowered Malicious User Detection for Spectrum Sensing in Cognitive Radio Networks. IEEE Access 12: 35300-35308 (2024) - [j17]Muhammad Ashfaq, Imran Khan, Abdulrahman Alzahrani, Muhammad Usman Tariq, Humera Khan, Anwar Ghani:
Accurate Wheat Yield Prediction Using Machine Learning and Climate-NDVI Data Fusion. IEEE Access 12: 40947-40961 (2024) - [j16]Abdulrahman Alzahrani:
VSKAP-IoD: A Verifiably Secure Key Agreement Protocol for Securing IoD Environment. IEEE Access 12: 58039-58056 (2024) - [j15]Abdulrahman Alzahrani:
Novel Approach for Intrusion Detection Attacks on Small Drones Using ConvLSTM Model. IEEE Access 12: 149238-149253 (2024) - [j14]Abdulrahman Alzahrani:
Developing a Provable Secure and Cloud-Centric Authentication Protocol for the e-Healthcare System. IEEE Access 12: 183665-183687 (2024) - [j13]Abdulrahman Alzahrani, Rafiq Ahmad Khan:
Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach. Comput. Hum. Behav. 153: 108109 (2024) - [j12]Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Syed Husnain Abbas Naqvi:
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing. Trans. Emerg. Telecommun. Technol. 35(9) (2024) - [j11]Seong-O Shim, Lal Hussain, Wajid Aziz, Abdulrahman A. Alshdadi, Abdulrahman Alzahrani, Abdulfattah Omar:
Deep learning convolutional neural network ResNet101 and radiomic features accurately analyzes mpMRI imaging to predict MGMT promoter methylation status with transfer learning approach. Int. J. Imaging Syst. Technol. 34(2) (2024) - [j10]Mohammed Maray, Ghadah Aldehim, Abdulrahman Alzahrani, Faiz Abdullah Alotaibi, Safa Alsafari, Elham Abdullah Alghamdi, Manar Ahmed Hamza:
Deer Hunting Optimization with Deep Learning-Driven Automated Fabric Defect Detection and Classification. Mob. Networks Appl. 29(1): 176-186 (2024) - [j9]Mashael S. Maashi, Eatedal Alabdulkreem, Mohammed Maray, K. Shankar, Abdulbasit A. Darem, Abdulrahman Alzahrani, Ishfaq Yaseen:
Elevating Survivability in Next-Gen IoT-Fog-Cloud Networks: Scheduling Optimization With the Metaheuristic Mountain Gazelle Algorithm. IEEE Trans. Consumer Electron. 70(1): 3802-3809 (2024) - 2023
- [j8]Mahmoud Ahmad Al-Khasawneh, Muhammad Faheem, Eman Aldhahri, Abdulrahman Alzahrani, Ala Abdulsalam Alarood:
A MapReduce Based Approach for Secure Batch Satellite Image Encryption. IEEE Access 11: 62865-62878 (2023) - [j7]Kiramat Rahman, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Arif Ur Rahman:
Pre-Trained Model-Based NFR Classification: Overcoming Limited Data Challenges. IEEE Access 11: 81787-81802 (2023) - [j6]Samina Amin, Muhammad Irfan Uddin, Ala Abdulsalam Alarood, Wali Khan Mashwani, Abdulrahman Alzahrani, Ahmed Omar Alzahrani:
Smart E-Learning Framework for Personalized Adaptive Learning and Sequential Path Recommendations Using Reinforcement Learning. IEEE Access 11: 89769-89790 (2023) - [j5]Hassan Zeb, Anwar Ghani, Moneeb Gohar, Abdulrahman Alzahrani, Muhammad Bilal, Daehan Kwak:
Location Centric Energy Harvesting Aware Routing Protocol for IoT in Smart Cities. IEEE Access 11: 102352-102365 (2023) - [j4]Saiyed Rasol Bin Tuan Muda, Mohammad Hafiz Mohd Yusof, Khaled Mofawiz Alfawaz, Mohammed Balfaqih, Abdulrahman Alzahrani:
New Optimized Adaptive Time Series IDS Classifier Algorithm: Beyond Deep Learning. IEEE Access 11: 129882-129904 (2023) - [j3]Samina Amin, Muhammad Irfan Uddin, Wali Khan Mashwani, Ala Abdulsalam Alarood, Abdulrahman Alzahrani, Ahmed Omar Alzahrani:
Developing a Personalized E-Learning and MOOC Recommender System in IoT-Enabled Smart Education. IEEE Access 11: 136437-136455 (2023) - [j2]Imran Khan, Anwar Ghani, Syed Muhammd Saqlain, Muhammad Usman Ashraf, Abdulrahman Alzahrani, DoHyeun Kim:
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks. IEEE Access 11: 144560-144573 (2023) - [j1]Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Syed Muhammad Saqlain, Khalid Yahya, Haseeb Sajjad:
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101601 (2023) - 2021
- [c9]Hani Alshahrani, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu:
Web-based Malware Detection for Android OS. CSCI 2021: 1317-1322 - 2020
- [i1]Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu:
Ransomware in Windows and Android Platforms. CoRR abs/2005.05571 (2020)
2010 – 2019
- 2019
- [c8]Ali Alshehri, Pawel Marcinek, Abdulrahman Alzahrani, Hani Alshahrani, Huirong Fu:
PUREDroid: Permission Usage and Risk Estimation for Android Applications. ICISDM 2019: 179-184 - [c7]Abdulrahman Alzahrani, Hani Alshahrani, Ali Alshehri, Huirong Fu:
An Intelligent Behavior-Based Ransomware Detection System For Android Platform. TPS-ISA 2019: 28-35 - 2018
- [c6]Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
DOPA: Detecting Open Ports in Android OS. CNS 2018: 1-2 - [c5]Abdelnasser Banihani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, George P. Corser:
T-PAAD: Trajectory Privacy Attack on Autonomous Driving. CNS 2018: 1-2 - [c4]Raed Alharthi, Abdelnasser Banihani, Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu, Anyi Liu, Ye Zhu:
Location Privacy Challenges in Spatial Crowdsourcing. EIT 2018: 564-569 - [c3]Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform. EIT 2018: 892-897 - [c2]Hani Alshahrani, Harrison Mansourt, Seaver Thorn, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu:
DDefender: Android application threat detection using static and dynamic analysis. ICCE 2018: 1-6 - 2017
- [c1]Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi:
Web Application Security Tools Analysis. BigDataSecurity/HPSC/IDS 2017: 237-242
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint