Fawaz Alsolami

Orcid: 0000-0001-5858-4908

Affiliations:
  • King Abdulaziz University, Jeddah, Saudi Arabia


According to our database1, Fawaz Alsolami authored at least 43 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things.
Future Internet, 2024

2023
Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture.
IEEE Trans. Intell. Transp. Syst., November, 2023

Deep Reinforcement Learning for Workload Prediction in Federated Cloud Environments.
Sensors, August, 2023

Managing Security of Healthcare Data for a Modern Healthcare System.
Sensors, April, 2023

Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions.
Mob. Networks Appl., February, 2023

A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure.
IEEE Internet Things J., 2023

Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car.
IEEE Access, 2023

2022
Interference Avoidance in Cognitive Radio Networks Using Cooperative Localization.
IEEE Syst. J., 2022

Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique.
Sensors, 2022

Machine learning techniques in internet of UAVs for smart cities applications.
J. Intell. Fuzzy Syst., 2022

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare.
IEEE Internet Things J., 2022

Electricity-Theft Detection for Change-and-Transmit Advanced Metering Infrastructure.
IEEE Internet Things J., 2022

Detection of False-Reading Attacks in Smart Grid Net-Metering System.
IEEE Internet Things J., 2022

Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics Using Blockchain.
IEEE Internet Things J., 2022

Hybrid Binary Butterfly Optimization Algorithm and Simulated Annealing for Feature Selection Problem.
Int. J. Appl. Metaheuristic Comput., 2022

2021
Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications.
Symmetry, 2021

Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain.
IEEE Open J. Commun. Soc., 2021

Adversarial Examples - Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices.
IEEE Internet Things J., 2021

Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks.
IEEE Internet Things J., 2021

Privacy Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning.
IEEE Internet Things J., 2021

Early MCI-to-AD Conversion Prediction Using Future Value Forecasting of Multimodal Features.
Comput. Intell. Neurosci., 2021

Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security.
IEEE Access, 2021

Development of Self-Synchronized Drones' Network Using Cluster-Based Swarm Intelligence Approach.
IEEE Access, 2021

Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability.
IEEE Access, 2021

2020
Decision and Inhibitory Trees and Rules for Decision Tables with Many-valued Decisions
Intelligent Systems Reference Library 156, Springer, ISBN: 978-3-030-12853-1, 2020

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model.
Symmetry, 2020

Cloud Computing Services: Taxonomy of Discovery Approaches and Extraction Solutions.
Symmetry, 2020

Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling.
J. Big Data, 2020

A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction.
IEEE Access, 2020

2019
Comparison of Heuristics for Optimization of Association Rules.
Fundam. Informaticae, 2019

A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Bi-criteria optimization problems for decision rules.
Ann. Oper. Res., 2018

An Architecture for Translating Sequential Code to Parallel.
Proceedings of the 2nd International Conference on Information System and Data Mining, 2018

2017
An Open Tool Architecture for Security Testing of NoSQL-Based Applications.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Dynamic Programming Approach for Construction of Association Rule Systems.
Fundam. Informaticae, 2016

2015
Comparison of Heuristics for Optimization of Association Rules.
Proceedings of the 24th International Workshop on Concurrency, 2015

2014
Decision Rule Classifiers for Multi-label Decision Tables.
Proceedings of the Rough Sets and Intelligent Systems Paradigms, 2014

Comparison of Heuristics for Inhibitory Rule Optimization.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

2013
Sequential Optimization of Approximate Inhibitory Rules Relative to the Length, Coverage and Number of Misclassifications.
Proceedings of the Rough Sets and Knowledge Technology - 8th International Conference, 2013

Optimization of Approximate Inhibitory Rules Relative to Number of Misclassifications.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

2012
Optimization of Inhibitory Decision Rules Relative to Length and Coverage.
Proceedings of the Rough Sets and Knowledge Technology - 7th International Conference, 2012

Length and Coverage of Inhibitory Decision Rules.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012


  Loading...