default search action
Abdulhadi Shoufan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Fayaz Mohamed Haneefa, Abdulhadi Shoufan, Ernesto Damiani:
The Essentials: A Comprehensive Survey to Get Started in Augmented Reality. IEEE Access 12: 109012-109070 (2024) - [j32]Kais Belwafi, Abdulhadi Shoufan, Mariam Alsafi, Ashfaq Ahmed, Kyusuk Han:
Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM. IEEE Access 12: 194962-194972 (2024) - [c47]Shamma Alwheibi, Abdulhadi Shoufan:
Lecture-Free Instruction: Does Gender Matter? EDUCON 2024: 1-8 - [c46]Kais Belwafi, Hamdan Alshamsi, Ashfaq Ahmed, Abdulhadi Shoufan:
Enhancing Circuit Authentication through Secure Isolation. ISCAS 2024: 1-5 - [p2]Ahmad Samer Wazan, Imran Taj, Abdulhadi Shoufan, Romain Laborde, Rémi Venant:
How to Design and Deliver Courses for Higher Education in the AI Era? General Aspects of Applying Generative AI in Higher Education 2024: 347-384 - [p1]Ahmad Samer Wazan, Imran Taj, Abdulhadi Shoufan, Romain Laborde, Rémi Venant:
Correction to: How to Design and Deliver Courses for Higher Education in the AI Era? General Aspects of Applying Generative AI in Higher Education 2024 - [i6]Kamal Taha, Abdulhadi Shoufan:
Techniques to Detect Crime Leaders within a Criminal Network: A Survey, Experimental, and Comparative Evaluations. CoRR abs/2402.03355 (2024) - 2023
- [j31]Mohamad Alansari, Oussama Abdul Hay, Sajid Javed, Abdulhadi Shoufan, Yahya H. Zweiri, Naoufel Werghi:
GhostFaceNets: Lightweight Face Recognition Model From Cheap Operations. IEEE Access 11: 35429-35446 (2023) - [j30]Abdulhadi Shoufan:
Exploring Students' Perceptions of ChatGPT: Thematic Analysis and Follow-Up Survey. IEEE Access 11: 38805-38818 (2023) - [j29]Ashfaq Ahmed, Abdulhadi Shoufan, Kais Belwafi:
Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust. IEEE Access 11: 60335-60348 (2023) - [j28]Abdulhadi Shoufan:
Can Students without Prior Knowledge Use ChatGPT to Answer Test Questions? An Empirical Study. ACM Trans. Comput. Educ. 23(4): 45:1-45:29 (2023) - [j27]Abdulhadi Shoufan, Ernesto Damiani:
Contingency Clarification Protocols for Reliable Counter-Drone Operation. IEEE Trans. Aerosp. Electron. Syst. 59(6): 8944-8955 (2023) - [j26]Ruba Alkadi, Abdulhadi Shoufan:
Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(1): 201-215 (2023) - [c45]Xuan Wang, Mithun Mukherjee, Vikas Kumar, Constandinos X. Mavromoustakis, Abdulhadi Shoufan, Mian Guo, Qi Zhang:
Rendering Delay Minimization in RIS-Assisted Edge Computing for IIoT with VR Streaming. GLOBECOM (Workshops) 2023: 1319-1324 - [c44]Sondos Alshamsi, Mariam Yousif Alhashmi, Kais Belwafi, Abdulhadi Shoufan:
A Low-Power Remote Identification Module for Drones. ISCAS 2023: 1-5 - [c43]Shamma Alwheibi, Abdulhadi Shoufan, Asli Hassan:
Active Distance Learning: How Student Perceptions Affect Academic Performance. TALE 2023: 1-8 - [c42]Kais Belwafi, Hamdan Alshamsi, Ashfaq Ahmed, Abdulhadi Shoufan:
Zero-Trust Communication between Chips. VLSI-SoC 2023: 1-5 - [i5]Ahmad Samer Wazan, Imran Taj, Abdulhadi Shoufan, Romain Laborde, Rémi Venant:
How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis. CoRR abs/2308.02441 (2023) - 2022
- [j25]Ruba Alkadi, Noura Alnuaimi, Chan Yeob Yeun, Abdulhadi Shoufan:
Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues. IEEE Access 10: 14463-14479 (2022) - [j24]Fatma Mohamed, Abdulhadi Shoufan:
Choosing YouTube Videos for Self-Directed Learning. IEEE Access 10: 51155-51166 (2022) - [j23]Kais Belwafi, Ruba Alkadi, Sultan Al-Ameri, Hussam M. N. Al Hamadi, Abdulhadi Shoufan:
Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey. IEEE Access 10: 87577-87601 (2022) - [j22]Abdulhadi Shoufan, Fatma Mohamed:
YouTube and Education: A Scoping Review. IEEE Access 10: 125576-125599 (2022) - [j21]Moatsum Alawida, Je Sen Teh, Abid Mehmood, Abdulhadi Shoufan, Wafa' Hamdan Alshoura:
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8136-8151 (2022) - 2021
- [j20]Abdulhadi Shoufan:
Active Distance Learning of Embedded Systems. IEEE Access 9: 41104-41122 (2021) - [j19]Abdul Wadood Tadbier, Abdulhadi Shoufan:
Ranking educational channels on YouTube: Aspects and issues. Educ. Inf. Technol. 26(3): 3077-3096 (2021) - [j18]Ruba Alkadi, Sultan Al-Ameri, Abdulhadi Shoufan, Ernesto Damiani:
Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data. IEEE Trans. Hum. Mach. Syst. 51(5): 451-462 (2021) - [i4]Ruba Alkadi, Abdulhadi Shoufan:
Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-sensing and Blockchain. CoRR abs/2110.14979 (2021) - [i3]Abdulhadi Shoufan, Ruba Alkadi:
Integrating Counter-UAS Systems into the UTM System for Reliable Decision Making. CoRR abs/2111.07291 (2021) - [i2]Ruba Alkadi, Noura Alnuaimi, Abdulhadi Shoufan, Chan Yeob Yeun:
Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues. CoRR abs/2111.09529 (2021) - 2020
- [j17]Abdulhadi Shoufan:
Lecture-Free Classroom: Fully Active Learning on Moodle. IEEE Trans. Educ. 63(4): 314-321 (2020) - [c41]Abdel Gafoor Haddad, Muhammad Ahmed Humais, Naoufel Werghi, Abdulhadi Shoufan:
Long-Range Visual UAV Detection and Tracking System with Threat Level Assessment. IECON 2020: 638-643 - [c40]Aysha Khaled Alharam, Abdulhadi Shoufan:
Optimized Random Forest Classifier for Drone Pilot Identification. ISCAS 2020: 1-5 - [c39]Abdulhadi Shoufan:
SR Latch: The Wrong Introduction to Digital Memory. ISCAS 2020: 1-5
2010 – 2019
- 2019
- [j16]Bilal Taha, Abdulhadi Shoufan:
Machine Learning-Based Drone Detection and Classification: State-of-the-Art in Research. IEEE Access 7: 138669-138682 (2019) - [j15]Abdulhadi Shoufan:
What motivates university students to like or dislike an educational online video? A sentimental framework. Comput. Educ. 134: 132-144 (2019) - [j14]Abdulhadi Shoufan:
Estimating the cognitive value of YouTube's educational videos: A learning analytics approach. Comput. Hum. Behav. 92: 450-458 (2019) - 2018
- [j13]Abdulhadi Shoufan, Haitham M. Al-Angari, Muhammad Faraz Afzal Sheikh, Ernesto Damiani:
Drone Pilot Identification by Classifying Radio-Control Signals. IEEE Trans. Inf. Forensics Secur. 13(10): 2439-2447 (2018) - [c38]Abdulhadi Shoufan, Abdulla Alnaqbi:
On the intrinsic complexity of logical transformation problems. EDUCON 2018: 577-584 - 2017
- [j12]Abdulhadi Shoufan, Ernesto Damiani:
On inter-Rater reliability of information security experts. J. Inf. Secur. Appl. 37: 101-111 (2017) - [j11]Abdulhadi Shoufan:
Toward Modeling the Intrinsic Complexity of Test Problems. IEEE Trans. Educ. 60(2): 157-163 (2017) - [c37]Abdulhadi Shoufan, Ernesto Damiani:
How Reliable are Experts’ Assessments? A Case Study on UAV Security. HAISA 2017: 104-113 - [c36]Abdulhadi Shoufan, Abdulla Alnaqbi:
An intrinsic complexity model for the problem of total resistance determination. ISCAS 2017: 1-4 - [c35]Abdulhadi Shoufan, Fatma Mohamed:
On the Likes and Dislikes of YouTube's Educational Videos: A Quantitative Study. SIGITE 2017: 127-132 - [c34]Abdulhadi Shoufan:
Continuous authentication of UAV flight command data using behaviometrics. VLSI-SoC 2017: 1-6 - 2016
- [j10]Tolga Arul, Abdulhadi Shoufan:
Subscription-free Pay-TV over IPTV. J. Syst. Archit. 64: 37-49 (2016) - [c33]Abdulhadi Shoufan:
ABS controller: An introductory case study for motivating non-major students. EDUCON 2016: 519-526 - [c32]Abdulhadi Shoufan:
Epistemic fidelity and cognitive constructivism in DLD-VISU. EDUCON 2016: 785-793 - [c31]Abdulhadi Shoufan:
Live demonstration of DLD-VISU: An eLearning platform for digital logic design. ISCAS 2016: 1439 - 2015
- [j9]Abdulhadi Shoufan, Zheng Lu, Sorin A. Huss:
A Web-Based Visualization and Animation Platform for Digital Logic Design. IEEE Trans. Learn. Technol. 8(2): 225-239 (2015) - [c30]Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek:
Secure Communication in Civil Drones. ICISSP (Revised Selected Papers) 2015: 177-195 - [c29]Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek:
On the Power Consumption of Cryptographic Processors in Civil Microdrones. ICISSP 2015: 283-290 - [c28]Abdulhadi Shoufan, Sumaya Alameri:
Natural Language Processing for Dialectical Arabic: A Survey. ANLP@ACL 2015: 36-48 - 2013
- [j8]Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong:
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure. Comput. J. 56(4): 497-507 (2013) - [j7]Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu:
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 32-54 (2013) - [c27]Abdulhadi Shoufan:
A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512. ReConFig 2013: 1-7 - 2012
- [c26]Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu:
Efficient Generic Construction of Forward-Secure Identity-Based Signature. ARES 2012: 55-64 - [c25]Tolga Arul, Abdulhadi Shoufan:
Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV. AINA Workshops 2012: 147-153 - [c24]Abdulhadi Shoufan:
A hardware security module for quadrotor communication. FPT 2012: 253-256 - 2011
- [j6]H. Gregor Molter, Marc Stöttinger, Abdulhadi Shoufan, Falko Strenzke:
A simple power analysis attack on a McEliece cryptoprocessor. J. Cryptogr. Eng. 1(1): 29-36 (2011) - [j5]Abdulhadi Shoufan, Tolga Arul:
A benchmarking environment for performance evaluation of tree-based rekeying algorithms. J. Syst. Softw. 84(7): 1130-1143 (2011) - [j4]Abdulhadi Shoufan, Nico Huber, H. Gregor Molter:
A novel cryptoprocessor architecture for chained Merkle signature scheme. Microprocess. Microsystems 35(1): 34-47 (2011) - [c23]Sunil Malipatlolla, Thomas Feller, Abdulhadi Shoufan, Tolga Arul, Sorin A. Huss:
A novel architecture for a secure update of cryptographic engines on trusted platform module. FPT 2011: 1-6 - [c22]Sunil Malipatlolla, Thomas Feller, Abdulhadi Shoufan, Tolga Arul, Sorin A. Huss:
A novel architecture for a secure update of cryptographic engines on trusted platform module. FPT 2011: 1-6 - 2010
- [j3]Abdulhadi Shoufan, Sorin A. Huss:
A Course on Reconfigurable Processors. ACM Trans. Comput. Educ. 10(2): 7:1-7:20 (2010) - [j2]Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Eike Kohnert:
A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem. IEEE Trans. Computers 59(11): 1533-1546 (2010) - [c21]Abdulhadi Shoufan:
An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme. ARC 2010: 145-156 - [c20]Abdulhadi Shoufan, Sorin Alexander Huss:
Reconfigurable Computing Education in Computer Science. ARC 2010: 329-336 - [c19]Abdulhadi Shoufan:
A compact course on VHDL-AMS. ISCAS 2010: 89-92 - [c18]Abdulhadi Shoufan, Nico Huber:
A fast hash tree generator for Merkle signature scheme. ISCAS 2010: 3945-3948 - [c17]Abdulhadi Shoufan, Zheng Lu, Guido Rößling:
A platform for visualizing digital circuit synthesis with VHDL. ITiCSE 2010: 294-298 - [c16]Abdulhadi Shoufan, Hagen Stübing, Sorin A. Huss:
Interactive Optimization of FPGA-based Systems-on-Chips. MBMV 2010: 217-226 - [c15]Hagen Stübing, Abdulhadi Shoufan, Sorin Alexander Huss:
Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control. VTC Spring 2010: 1-5 - [c14]Hagen Stübing, Abdulhadi Shoufan, Sorin Alexander Huss:
A Demonstrator for Beamforming in C2X Communication. VTC Spring 2010: 1-2
2000 – 2009
- 2009
- [j1]Abdulhadi Shoufan, Sorin A. Huss:
High-Performance Rekeying Processor Architecture for Group Key Management. IEEE Trans. Computers 58(10): 1421-1434 (2009) - [c13]Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Falko Strenzke:
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. ASAP 2009: 98-105 - [c12]Abdulhadi Shoufan, Sorin Alexander Huss:
Understanding physical models in VHDL-AMS. FDL 2009: 1-4 - [c11]Abdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger:
A Timing Attack against Patterson Algorithm in the McEliece PKC. ICISC 2009: 161-175 - [c10]Adeel Israr, Abdulhadi Shoufan, Sorin A. Huss:
A compact error model for reliable system design. HPCS 2009: 60-66 - [c9]Adeel Israr, Abdulhadi Shoufan, Sorin A. Huss:
An efficient reliability evaluation approach for system-level design of embedded systems. ISQED 2009: 339-344 - [i1]Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, Sorin A. Huss:
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks. CoRR abs/0903.3900 (2009) - 2008
- [c8]Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan:
Side Channels in the McEliece PKC. PQCrypto 2008: 216-229 - [c7]Abdulhadi Shoufan, Sorin A. Huss, Oliver Kelm, Sebastian Schipp:
A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures. ReConFig 2008: 301-306 - [c6]Abdulhadi Shoufan, Sorin A. Huss:
Schlüsselverwaltung im Sicheren Multicast. Sicherheit 2008: 179-191 - 2007
- [b1]Abdulhadi Shoufan:
Group key management: algorithms, benchmarking, and reconfigurable architectures. Darmstadt University of Technology, Germany, 2007, pp. 1-137 - [c5]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
High-Flexibility Rekeying Processor for Key Management in Secure Multicast. AINA Workshops (1) 2007: 822-829 - [c4]Ralf Laue, Oliver Kelm, Sebastian Schipp, Abdulhadi Shoufan, Sorin A. Huss:
Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. FPL 2007: 480-484 - [c3]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
Secure Multicast Rekeying: A Case Study for HW/SW-Codesign. MBMV 2007: 171-180 - [c2]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast. WOWMOM 2007: 1-8 - 2005
- [c1]Abdulhadi Shoufan, Sorin A. Huss, Murtuza Cutleriwala:
A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management. HiPEAC 2005: 169-183
Coauthor Index
aka: Sorin Alexander Huss
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint