Skip to main content

Research Repository

Advanced Search

Outputs (12)

Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer (2024)
Journal Article
Gaber, T., Nicho, M., Ahmed, E., & Hamed, A. (2024). Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer. #Journal not on list, 85, Article 103838. https://doi.org/10.1016/j.jisa.2024.103838

In the security domain, the growing need for reliable authentication methods highlights the importance of
thermal face recognition for enhancing law enforcement surveillance and safety especially in IoT applications.
Challenges like computational r... Read More about Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer.

FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning (2024)
Presentation / Conference Contribution

In the realm of smart water utilities, the increasing sophistication of cyber threats presents a significant challenge to the security and operational integrity of water and wastewater treatment facilities. These facilities, heavily dependent on Indu... Read More about FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning.

Integrating ChatGPT into Medical Education: A Combined SEM-ML Approach (2024)
Journal Article
Salloum, S., Shaalan, K., Alfaisal, R., Salloum, A., & Gaber, T. (2024). Integrating ChatGPT into Medical Education: A Combined SEM-ML Approach. #Journal not on list, https://doi.org/10.1109/assic60049.2024.10507994

The educational realm has undergone profound transformations due to technological advancements, evolving from conventional classrooms to digital platforms, such as online learning modules and virtual simulations. Within this context, ChatGPT, an inno... Read More about Integrating ChatGPT into Medical Education: A Combined SEM-ML Approach.

ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques (2024)
Journal Article
Eltoukhy, M. M., Gaber, T., Almazroi, A. A., & Mohamed, M. F. (in press). ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Computer Science, 10, e2001. https://doi.org/10.7717/peerj-cs.2001

This study focuses on addressing computational limits in smartphones by proposing an efficient authentication model that enables implicit authentication without requiring additional hardware and incurring less computational cost. The research explore... Read More about ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques.

FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network (2024)
Journal Article
Ali Almazroi, A., A. Alqarni, M., A. Al-Shareeda, M., H. Alkinani, M., Atallah Almazroey, A., & Gaber, T. (2024). FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network. Internet of Things, 25, https://doi.org/10.1016/j.iot.2024.101096

Emerging technology known as intelligent transportation systems allows for seamless two-way communication between moving vehicles and stationary infrastructure. Therefore, core security services in a vehicular network consist of encrypting and trusti... Read More about FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network.