default search action
Saif M. Al-Kuwari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif Al-Kuwari:
Enhancing physical layer security with reconfigurable intelligent surfaces and friendly jamming: A secrecy analysis. Comput. Commun. 221: 106-119 (2024) - [j26]Elmehdi Illi, Marwa K. Qaraqe, Saud Althunibat, Abdullah Al-Hasanat, Moath Alsafasfeh, Marcus de Ree, Georgios Mantas, Jonathan Rodriguez, Waqas Aman, Saif Al-Kuwari:
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. IEEE Commun. Surv. Tutorials 26(1): 347-388 (2024) - [j25]Sritam Kumar Satpathy, Vallabh Vibhu, Bikash K. Behera, Saif Al-Kuwari, Shahid Mumtaz, Ahmed Farouk:
Analysis of Quantum Machine Learning Algorithms in Noisy Channels for Classification Tasks in the IoT Extreme Environment. IEEE Internet Things J. 11(3): 3840-3852 (2024) - [j24]Syed M. Arslan, Saif Al-Kuwari, Tasawar Abbas:
Superdense Coding Using Bragg Diffracted Hyperentangled Atoms. IEEE J. Sel. Areas Commun. 42(7): 1950-1959 (2024) - [j23]Waqas Aman, Saif Al-Kuwari, Marwa K. Qaraqe:
A novel physical layer authentication mechanism for static and mobile 3D underwater acoustic communication networks. Phys. Commun. 66: 102430 (2024) - [j22]Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities. Theor. Comput. Sci. 987: 114368 (2024) - [j21]Fucai Luo, Saif Al-Kuwari, Yong Ding:
SVFL: Efficient Secure Aggregation and Verification for Cross-Silo Federated Learning. IEEE Trans. Mob. Comput. 23(1): 850-864 (2024) - [j20]Abdullatif Albaseer, Nima Abdi, Mohamed M. Abdallah, Marwa K. Qaraqe, Saif Al-Kuwari:
FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks. IEEE Trans. Netw. Serv. Manag. 21(4): 4844-4860 (2024) - [j19]Muhammad Muzzammil, Saif Al-Kuwari, Niaz Ahmed, Marwa K. Qaraqe:
Full-Duplex Magnetic Induction Communication: Opportunities and Challenges. IEEE Wirel. Commun. 31(4): 293-298 (2024) - [c20]Muhammad Kashif, Muhammad Rashid, Saif Al-Kuwari, Muhammad Akmal Shafique:
Alleviating Barren Plateaus in Parameterized Quantum Machine Learning Circuits: Investigating Advanced Parameter Initialization Strategies. DATE 2024: 1-6 - [i15]Maryam Al-Fehani, Saif Al-Kuwari:
Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics. CoRR abs/2402.02089 (2024) - [i14]Hala Amin, Waqas Aman, Saif Al-Kuwari:
On the Potential of Re-configurable Intelligent Surface (RIS)-assisted Physical Layer Authentication (PLA). CoRR abs/2405.00426 (2024) - [i13]Waqas Aman, Saif Al-Kuwari, Marwa K. Qaraqe:
Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers. CoRR abs/2405.02885 (2024) - [i12]Abdullatif Albaseer, Nima Abdi, Mohamed M. Abdallah, Marwa K. Qaraqe, Saif M. Al-Kuwari:
FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks. CoRR abs/2407.02845 (2024) - 2023
- [j18]Muhammad Kashif, Saif Al-Kuwari:
Physical Realization of Measurement Based Quantum Computation. IEEE Access 11: 90105-90130 (2023) - [j17]Waqas Aman, Saif M. Al-Kuwari, Muhammad Muzzammil, Muhammad Mahboob Ur Rahman, Ambrish Kumar:
Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook. Ad Hoc Networks 142: 103114 (2023) - [j16]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Fuqun Wang, Kefei Chen:
Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84: 103698 (2023) - [j15]Fucai Luo, Haiyan Wang, Saif M. Al-Kuwari, Weihong Han:
Multi-key Fully Homomorphic Encryption without CRS from RLWE. Comput. Stand. Interfaces 86: 103742 (2023) - [j14]Abdulaziz Al-Meer, Saif Al-Kuwari:
Physical Unclonable Functions (PUF) for IoT Devices. ACM Comput. Surv. 55(14s): 314:1-314:31 (2023) - [j13]Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari:
On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI. IEEE Internet Things J. 10(9, May 1): 7850-7867 (2023) - [j12]Shradha Deshmukh, Bikash K. Behera, Preeti Mulay, Emad A. Ahmed, Saif Al-Kuwari, Prayag Tiwari, Ahmed Farouk:
Explainable quantum clustering method to model medical data. Knowl. Based Syst. 267: 110413 (2023) - [j11]Muhammad Kashif, Saif M. Al-Kuwari:
The impact of cost function globality and locality in hybrid quantum neural networks on NISQ devices. Mach. Learn. Sci. Technol. 4(1): 15004 (2023) - [j10]Muhammad Kashif, Saif Al-Kuwari:
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs. Int. J. Parallel Emergent Distributed Syst. 38(5): 362-400 (2023) - [j9]Fucai Luo, Saif M. Al-Kuwari:
Generic Construction of Black-Box Traceable Attribute-Based Encryption. IEEE Trans. Cloud Comput. 11(1): 942-955 (2023) - [c19]Abdulaziz Al-Meer, Saif Al-Kuwari:
A Novel Integrity Protocol Based on Physical Unclonable Functions. ISNCC 2023: 1-6 - [c18]Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:
Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. ISNCC 2023: 1-6 - [c17]Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah:
Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. ISNCC 2023: 1-6 - [c16]Waqas Aman, Saif Al-Kuwari, Marwa K. Qaraqe:
Location-based Physical Layer Authentication in Underwater Acoustic Communication Networks. VTC2023-Spring 2023: 1-6 - [c15]Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari:
Secrecy Analysis of a Dual-Hop Wireless Network with Independent Eavesdroppers and Outdated CSI. WCNC 2023: 1-6 - [i11]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning. CoRR abs/2305.12950 (2023) - [i10]Waqas Aman, Flavio Giorgi, Giulio Attenni, Saif Al-Kuwari, Elmehdi Illi, Marwa K. Qaraqe, Gaia Maselli, Roberto Di Pietro:
Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication. CoRR abs/2307.12643 (2023) - [i9]Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:
Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. CoRR abs/2308.14693 (2023) - 2022
- [j8]Ambrish Kumar, Saif M. Al-Kuwari, Dushantha Nalin K. Jayakody, Reem Alkanhel:
Security Performance Analysis of a NOMA-Assisted Underwater VLC System Under Imprecise Channel Estimations. IEEE Access 10: 117021-117032 (2022) - [j7]Fucai Luo, Saif M. Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen:
Provable Data Possession Schemes from Standard Lattices for Cloud Computing. Comput. J. 65(12): 3223-3239 (2022) - [j6]Fucai Luo, Saif M. Al-Kuwari:
Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security. Des. Codes Cryptogr. 90(5): 1157-1177 (2022) - [j5]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. IEEE Trans. Cloud Comput. 10(4): 2398-2408 (2022) - [c14]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Weihong Han:
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. ESORICS (1) 2022: 259-282 - [c13]Soroor Shekarizadeh, Razieh Rastgoo, Saif Al-Kuwari, Mohammad Sabokrou:
Deep-Disaster: Unsupervised Disaster Detection and Localization Using Visual Data. ICPR 2022: 2814-2821 - [c12]Muhammad Kashif, Saif Al-Kuwari:
Demonstrating Quantum Advantage in Hybrid Quantum Neural Networks for Model Capacity. ICRC 2022: 36-44 - [c11]Muhammad Kashif, Saif Al-Kuwari:
Qiskit As a Simulation Platform for Measurement-based Quantum Computation. ICSA Companion 2022: 152-159 - [c10]Abdulah Jarouf, Nader Meskin, Saif Al-Kuwari, Mohammad Shakerpour, Christos G. Cassandras:
Security Analysis of Merging Control for Connected and Automated Vehicles. IV 2022: 1739-1744 - [i8]Soroor Shekarizadeh, Razieh Rastgoo, Saif Al-Kuwari, Mohammad Sabokrou:
Deep-Disaster: Unsupervised Disaster Detection and Localization Using Visual Data. CoRR abs/2202.00050 (2022) - [i7]Waqas Aman, Saif M. Al-Kuwari, Ambrish Kumar, Muhammad Mahboob Ur Rahman:
Security of Underwater and Air-Water Wireless Communication. CoRR abs/2203.02667 (2022) - [i6]Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari:
On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdropping and Imperfect CSI. CoRR abs/2205.07231 (2022) - [i5]Abdulaziz Al-Meer, Saif Al-Kuwari:
Physical Unclonable Functions (PUF) for IoT Devices. CoRR abs/2205.08587 (2022) - [i4]Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari:
Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks? CoRR abs/2208.01726 (2022) - [i3]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities. IACR Cryptol. ePrint Arch. 2022: 1152 (2022) - 2021
- [j4]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Attribute-based proxy re-signature from standard lattices and its applications. Comput. Stand. Interfaces 75: 103499 (2021) - [j3]Fucai Luo, Saif M. Al-Kuwari:
Revocable attribute-based proxy re-encryption. J. Math. Cryptol. 15(1): 465-482 (2021) - [j2]Fucai Luo, Saif M. Al-Kuwari, Fuqun Wang, Kefei Chen:
Attribute-based proxy re-encryption from standard lattices. Theor. Comput. Sci. 865: 52-62 (2021) - [c9]Marcus de Ree, Georgios Mantas, Jonathan Rodriguez, Saud Althunibat, Marwa K. Qaraqe, Abdullah Al-Hasanat, Saif M. Al-Kuwari, Moath Alsafasfeh, Gabriele Oligeri, Seda Dogan Tusha, Muhammad Usman, Fatima Abu Taha, Samiha Alfalahat, Tasneem Alshamaseen, Malak Qaisi:
Data Confidentiality for IoT Networks: Cryptographic Gaps and Physical-Layer Opportunities. CAMAD 2021: 1-6 - [c8]Sobia Arshad, Masoom Alam, Saif Al-Kuwari, Muhammad Haider Ali Khan:
Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range. EDUCON 2021: 873-879
2010 – 2019
- 2012
- [j1]Saif M. Al-Kuwari, Stephen D. Wolthusen:
Algorithmic approach for clandestine localisation and tracking in short-range environments. Int. J. Commun. Networks Distributed Syst. 9(3/4): 311-327 (2012) - [c7]Saif M. Al-Kuwari, Stephen D. Wolthusen:
Forensic Tracking and Mobility Prediction in Vehicular Networks. IFIP Int. Conf. Digital Forensics 2012: 303-317 - [i2]Saif Al-Kuwari:
On the Indifferentiability of the Integrated-Key Hash Functions. IACR Cryptol. ePrint Arch. 2012: 9 (2012) - 2011
- [c6]Saif M. Al-Kuwari, Stephen D. Wolthusen:
Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework. SADFE 2011: 1-4 - [i1]Saif Al-Kuwari, James H. Davenport, Russell J. Bradford:
Cryptographic Hash Functions: Recent Design Trends and Security Notions. IACR Cryptol. ePrint Arch. 2011: 565 (2011) - 2010
- [c5]Saif M. Al-Kuwari, Stephen D. Wolthusen:
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Communications and Multimedia Security 2010: 16-27 - [c4]Saif M. Al-Kuwari, Stephen D. Wolthusen:
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. e-Forensics 2010: 207-223 - [c3]Saif M. Al-Kuwari, Stephen D. Wolthusen:
Forensic Tracking and Mobility Prediction in Vehicular Networks. IFIP Int. Conf. Digital Forensics 2010: 91-105 - [c2]Saif M. Al-Kuwari, Stephen D. Wolthusen:
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. MobiSec 2010: 67-79
2000 – 2009
- 2009
- [c1]Saif M. Al-Kuwari, Stephen D. Wolthusen:
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. ICDF2C 2009: 19-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint