default search action
Mznah Al-Rodhaan
Person information
- unicode name: د. مزنه عبدالله الروضان
- affiliation: King Saud University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Huan Rong, Xin Yu, Tinghuai Ma, Victor S. Sheng, Yang Zhou, Mznah Al-Rodhaan:
Three-stage Transferable and Generative Crowdsourced Comment Integration Framework Based on Zero- and Few-shot Learning with Domain Distribution Alignment. ACM Trans. Knowl. Discov. Data 18(3): 68:1-68:43 (2024) - 2023
- [c18]Huan Rong, Victor S. Sheng, Tinghuai Ma, Yang Zhou, Mznah Al-Rodhaan:
A Self-play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario : Extended Abstract. ICDE 2023: 3847-3848 - 2022
- [j44]Tinghuai Ma, Huan Rong, Yongsheng Hao, Jie Cao, Yuan Tian, Mznah Al-Rodhaan:
A Novel Sentiment Polarity Detection Framework for Chinese. IEEE Trans. Affect. Comput. 13(1): 60-74 (2022) - [j43]Huan Rong, Victor S. Sheng, Tinghuai Ma, Yang Zhou, Mznah Al-Rodhaan:
A Self-Play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario. IEEE Trans. Knowl. Data Eng. 34(3): 1021-1037 (2022) - 2021
- [c17]Randa Aljably, Mznah Al-Rodhaan, Yuan Tian:
Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks. ICBDS 2021: 630-642 - [c16]Lamya Albraheem, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Bus-based WSMP Dissemination Protocol for Vehicular Network. iiWAS 2021: 504-516 - 2020
- [j42]Tinghuai Ma, Qin Liu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LGIEM: Global and local node influence based community detection. Future Gener. Comput. Syst. 105: 533-546 (2020) - [j41]Randa Aljably, Yuan Tian, Mznah Al-Rodhaan:
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. Secur. Commun. Networks 2020: 5874935:1-5874935:14 (2020)
2010 – 2019
- 2019
- [j40]Fagen Song, Tinghuai Ma, Yuan Tian, Mznah Al-Rodhaan:
A New Method of Privacy Protection: Random k-Anonymous. IEEE Access 7: 75434-75445 (2019) - [j39]Tinghuai Ma, YuWei Zhao, Honghao Zhou, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Natural disaster topic extraction in Sina microblogging based on graph analysis. Expert Syst. Appl. 115: 346-355 (2019) - [j38]Huan Rong, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Deep rolling: A novel emotion prediction model for a multi-participant communication context. Inf. Sci. 488: 158-180 (2019) - [j37]Yuan Tian, Mariya M. Kaleemullah, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
A privacy preserving location service for cloud-of-things system. J. Parallel Distributed Comput. 123: 215-222 (2019) - [j36]Alia Alabdulkarim, Mznah Al-Rodhaan, Tinghuai Ma, Yuan Tian:
PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices. Sensors 19(1): 142 (2019) - [c15]Miada Murad, Yuan Tian, Mznah Al-Rodhaan:
Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structure. ICBDS 2019: 135-156 - 2018
- [j35]Tinghuai Ma, Jingjing Qu, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm. IEEE Access 6: 7214-7223 (2018) - [j34]Tinghuai Ma, Yu Hao, Wenhai Shen, Yuan Tian, Mznah Al-Rodhaan:
An Improved Web Cache Replacement Algorithm Based on Weighting and Cost. IEEE Access 6: 27010-27017 (2018) - [j33]Tinghuai Ma, Siyang Yu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks. IEEE Access 6: 66621-66631 (2018) - [j32]Tinghuai Ma, Jing Jia, Yu Xue, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Protection of location privacy for moving kNN queries in social networks. Appl. Soft Comput. 66: 525-532 (2018) - [j31]Rasha Al-Mutiri, Mznah Al-Rodhaan, Yuan Tian:
Improving Vehicular Authentication in VANET Using. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - [j30]Arwa Alromih, Mznah Al-Rodhaan, Yuan Tian:
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors 18(12): 4346 (2018) - [c14]Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan:
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension. ICCCS (3) 2018: 32-43 - 2017
- [j29]Anees Ara, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan:
A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems. IEEE Access 5: 12601-12617 (2017) - [j28]Zohair Al-Ameen, Ghazali Sulong, Amjad Rehman, Mznah Al-Rodhaan, Tanzila Saba, Abdullah Al-Dhelaan:
Phase-preserving approach in denoising computed tomography medical images. Comput. methods Biomech. Biomed. Eng. Imaging Vis. 5(1): 16-26 (2017) - 2016
- [j27]Tinghuai Ma, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2): 311-330 (2016) - [j26]Tinghuai Ma, Limin Guo, Meili Tang, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness. IEICE Trans. Inf. Syst. 99-D(6): 1512-1520 (2016) - [j25]Maram Al-Shablan, Yuan Tian, Mznah Al-Rodhaan:
Secure multi-owner-based cloud computing scheme for big data. Int. J. Big Data Intell. 3(3): 182-189 (2016) - [j24]Yinghua Lv, Tinghuai Ma, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171: 9-22 (2016) - [j23]Tinghuai Ma, Yao Wang, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LED: A fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207: 488-500 (2016) - [j22]Najla Al-Nabhan, Bowu Zhang, Xiuzhen Cheng, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Three connected dominating set algorithms for wireless sensor networks. Int. J. Sens. Networks 21(1): 53-66 (2016) - [i2]Anees Ara, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan:
A secure service provisioning framework for cyber physical cloud computing systems. CoRR abs/1611.00374 (2016) - 2015
- [j21]Rania Mousa, Mohd Shahrizal Sunar, Hoshang Kolivand, Amjad Rehman, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Marker Hiding Methods: Applications in Augmented Reality. Appl. Artif. Intell. 29(2): 101-118 (2015) - [j20]Wei Tian, Tinghuai Ma, Yuhui Zheng, Xin Wang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted curvature-preserving PDE image filtering method. Comput. Math. Appl. 70(6): 1336-1344 (2015) - [j19]Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
KDVEM : a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12): 1165-1184 (2015) - [j18]Zohair Al-Ameen, Ghazali Sulong, Amjad Rehman, Abdullah Al-Dhelaan, Tanzila Saba, Mznah Al-Rodhaan:
An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization. EURASIP J. Adv. Signal Process. 2015: 32 (2015) - [j17]Yuan Le, Xiuzhen Cheng, Dechang Chen, Nan Zhang, Taieb Znati, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2015: 49 (2015) - [j16]Tinghuai Ma, Jinjuan Zhou, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Sungyoung Lee:
Social Network and Tag Sources Based Augmenting Collaborative Recommender System. IEICE Trans. Inf. Syst. 98-D(4): 902-910 (2015) - [j15]Noor Asma Husain, Mohd Shafry Mohd Rahim, Amjad Rehman Khan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Tanzila Saba:
Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS). J. Intell. Fuzzy Syst. 28(1): 337-344 (2015) - [i1]Mutaz Beraka, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Collaborative Bibliographic System for Review/Survey Articles. CoRR abs/1509.04218 (2015) - 2014
- [j14]Tanzila Saba, Amjad Rehman, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Evaluation of Current Documents Image Denoising Techniques: A Comparative Study. Appl. Artif. Intell. 28(9): 879-887 (2014) - [j13]Ali Nodehi, Ghazali Sulong, Mznah Al-Rodhaan, Amjad Rehman, Abdullah Al-Dhelaan, Tanzila Saba:
Intelligent fuzzy approach for fast fractal image compression. EURASIP J. Adv. Signal Process. 2014: 112 (2014) - [j12]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Distributed Energy-Efficient Approaches for Connected Dominating Set Construction in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j11]Wei Li, Shengling Wang, Yong Cui, Xiuzhen Cheng, Ran Xin, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
AP Association for Proportional Fairness in Multirate WLANs. IEEE/ACM Trans. Netw. 22(1): 191-202 (2014) - [c13]Yuan Tian, Biao Song, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Eui-Nam Huh:
Threat-based evaluation for context-aware multimedia surveillance system. ICUIMC 2014: 48:1-48:8 - [c12]Amal Alharbi, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Q-Routing in Cognitive Packet Network Routing Protocol for MANETs. IJCCI (NCTA) 2014: 234-243 - [c11]Yuan Tian, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. ISBAST 2014: 166-170 - 2013
- [j10]Ohood Saud Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j9]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Xiuzhen Cheng:
Connected dominating set algorithms for wireless sensor networks. Int. J. Sens. Networks 13(2): 121-134 (2013) - [c10]Bowu Zhang, Wei Cheng, Limin Sun, Xiuzhen Cheng, Taieb Znati, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model. MiSeNet@MobiCom 2013: 11-20 - [c9]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Xiuzhen Cheng:
Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks. SMC 2013: 4450-4455 - [c8]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A distributed self-healing algorithm for virtual backbone construction and maintenance in Wireless Sensor Networks. WiSEE 2013: 1-6 - 2012
- [c7]Ohood Saud Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Biometric access control for wireless nodes. CASoN 2012: 167-174 - [c6]Najla Al-Nabhan, Bowu Zhang, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Two Connected Dominating Set Algorithms for Wireless Sensor Networks. WASA 2012: 705-713 - 2011
- [j8]Zhi Sun, Pu Wang, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Networks 9(3): 218-227 (2011) - [j7]Zhi Sun, Pu Wang, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
BorderSense: Border patrol through advanced wireless sensor networks. Ad Hoc Networks 9(3): 468-477 (2011) - [j6]Min Ding, Qilian Liang, Xiuzhen Cheng, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Scott C.-H. Huang, Dechang Chen:
A Model-Based Approach for Outlier Detection in Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(3-4): 275-293 (2011) - [j5]Pu Wang, Zhi Sun, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
On network connectivity of wireless sensor networks for sandstorm monitoring. Comput. Networks 55(5): 1150-1157 (2011) - [j4]Wei Li, Yong Cui, Xiuzhen Cheng, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs. IEEE Trans. Wirel. Commun. 10(11): 3784-3792 (2011) - [c5]Hajar Al-Hujailan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A cooperative intrusion detection scheme for clustered mobile ad hoc networks. IAS 2011: 179-185 - [c4]Pu Wang, Zhi Sun, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring. ICC 2011: 1-5 - [c3]Yuan Le, Liran Ma, Hongjun Yu, Xiuzhen Cheng, Yong Cui, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks. WASA 2011: 271-279 - 2010
- [j3]Mznah Al-Rodhaan, Lewis M. Mackenzie, Mohamed Ould-Khaoua:
Efficient Expanding Ring Search for MANETs. Int. J. Commun. Networks Inf. Secur. 2(3) (2010) - [c2]Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Efficient Route Discovery Algorithm for MANETs. NAS 2010: 165-170
2000 – 2009
- 2009
- [b1]Mznah Abdullah Al-Rodhaan:
Traffic locality oriented route discovery algorithms for mobile ad hoc networks. University of Glasgow, UK, 2009 - [j2]Mznah Al-Rodhaan, Lewis M. Mackenzie, Mohamed Ould-Khaoua:
On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay. Int. J. Commun. Netw. Syst. Sci. 2(3): 203-210 (2009) - [j1]Mznah Al-Rodhaan, Lewis M. Mackenzie, Mohamed Ould-Khaoua:
Traffic Locality Oriented Route Discovery Algorithm with Delay. Int. J. Comput. Their Appl. 16(3): 171-179 (2009) - [c1]Mznah Al-Rodhaan, Lewis M. Mackenzie, Mohamed Ould-Khaoua:
Traffic Locality Oriented Route Discovery Algorithm with Chase Packets for Mobile Ad Hoc Networks. ICWN 2009: 345-353
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint