Madini O. Alassafi

Orcid: 0000-0001-9919-8368

Affiliations:
  • King Abdulaziz University, Department of Information Technology, Jeddah, Saudi Arabia
  • University of Southampton, UK (PhD 2018)


According to our database1, Madini O. Alassafi authored at least 52 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics.
J. Cloud Comput., December, 2024

Enabling Efficient Vehicle-Road Cooperation Through AIoT: A Deep Learning Approach to Computational Offloading.
IEEE Internet Things J., November, 2024

Securing IIoT operations with recurrent federated network-based enhanced local search grasshopper.
Neural Comput. Appl., September, 2024

Optimized Bi-LSTM: a novel approach for attack detection in industrial IoT.
Signal Image Video Process., July, 2024

Scale based entropy measures and deep learning methods for analyzing the dynamical characteristics of cardiorespiratory control system in COVID-19 subjects during and after recovery.
Comput. Biol. Medicine, March, 2024

Opposition-based differential evolution for synchronized control of multi-agent systems with uncertain nonlinear dynamics.
Appl. Soft Comput., January, 2024

The power of Deep Learning techniques for predicting student performance in Virtual Learning Environments: A systematic literature review.
Comput. Educ. Artif. Intell., 2024

2023
Fully supervised contrastive learning in latent space for face presentation attack detection.
Appl. Intell., October, 2023

Formulation of rules for the scientific community using deep learning.
Scientometrics, March, 2023

A Novel Deep Learning Architecture With Image Diffusion for Robust Face Presentation Attack Detection.
IEEE Access, 2023

Taking All the Factors We Need: A Multimodal Depression Classification With Uncertainty Approximation.
IEEE Access, 2023

2022
An efficient resource optimization scheme for D2D communication.
Digit. Commun. Networks, December, 2022

AutoRet: A Self-Supervised Spatial Recurrent Network for Content-Based Image Retrieval.
Sensors, 2022

Beyond traditional approaches: a partial directed coherence with graph theory-based mental load assessment using EEG modality.
Neural Comput. Appl., 2022

Adaptive tracking control for nonlinear system in pure-feedback form with prescribed performance and unknown hysteresis.
IMA J. Math. Control. Inf., 2022

Time series predicting of COVID-19 based on deep learning.
Neurocomputing, 2022

Fuzzy Command Filter Backstepping Control for Incommensurate Fractional-Order Systems via Composite Learning.
Int. J. Fuzzy Syst., 2022

Distributed Consensus Tracking Control of Chaotic Multi-Agent Supply Chain Network: A New Fault-Tolerant, Finite-Time, and Chatter-Free Approach.
Entropy, 2022

2021
C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN.
Wirel. Commun. Mob. Comput., 2021

Real-Time Surveillance Using Deep Learning.
Secur. Commun. Networks, 2021

Predicting catastrophic temperature changes based on past events via a CNN-LSTM regression mechanism.
Neural Comput. Appl., 2021

On Knowledge Discovery and Representations of Molecular Structures Using Topological Indices.
J. Artif. Intell. Soft Comput. Res., 2021

Fuzzy synchronization of fractional-order chaotic systems using finite-time command filter.
Inf. Sci., 2021

Switched-observer-based adaptive output-feedback control design with unknown gain for pure-feedback switched nonlinear systems via average dwell time.
Int. J. Syst. Sci., 2021

Towards an Intelligent Framework for Cloud Service Discovery.
Int. J. Cloud Appl. Comput., 2021

From Teaching to Coaching: A Case Study of a Technical Communication Course.
CoRR, 2021

Success indicators for an efficient utilization of cloud computing in healthcare organizations: Saudi healthcare as case study.
Comput. Methods Programs Biomed., 2021

2020
An Effective Knowledge-Based Modeling Approach towards a "Smart-School Care Coordination System" for Children and Young People with Special Educational Needs and Disabilities.
Symmetry, 2020

On the Design of Thermal-Aware Duty-Cycle MAC Protocol for IoT Healthcare.
Sensors, 2020

Internet of Things Forensics: A Review.
Internet Things, 2020

Risk-Based Access Control Model: A Systematic Literature Review.
Future Internet, 2020

Exploiting Level 1 and Level 3 features of fingerprints for liveness detection.
Biomed. Signal Process. Control., 2020

An Autoregressive Exogenous Neural Network to Model Fire Behavior via a Naïve Bayes Filter.
IEEE Access, 2020

Automatic Segmentation Using a Hybrid Dense Network Integrated With an 3D-Atrous Spatial Pyramid Pooling Module for Computed Tomography (CT) Imaging.
IEEE Access, 2020

Social Anchor: Privacy-Friendly Attribute Aggregation From Social Networks.
IEEE Access, 2020

An Algorithmic Approach to Compute the Metric Index of Chordal Ring Networks.
IEEE Access, 2020

2019
Corrigendum to: "An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context" [Telematics and Informatics, 34 (2017) 664-678].
Telematics Informatics, 2019

Corrigendum to: "A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies" [Telematics and Informatics, 34 (2017) 996-1010].
Telematics Informatics, 2019

An Efficient Algorithm for mmWave MIMO Systems.
Symmetry, 2019

An energy-efficient fog-to-cloud Internet of Medical Things architecture.
Int. J. Distributed Sens. Networks, 2019

Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment.
Int. J. Commun. Networks Inf. Secur., 2019

A Conceptual Framework for Successful E-commerce Smartphone Applications: The Context of GCC.
CoRR, 2019

In Search of Self-Sovereign Identity Leveraging Blockchain Technology.
IEEE Access, 2019

Real-Time Surveillance Through Face Recognition Using HOG and Feedforward Neural Networks.
IEEE Access, 2019

Performance Analysis of Cryptographic Pseudorandom Number Generators.
IEEE Access, 2019

Determining Factors Pertaining to Cloud Security Adoption Framework in Government Organizations: An Exploratory Study.
IEEE Access, 2019

IoT Forensics: A State-of-the-Art Review, Challenges and Future Directions.
Proceedings of the 4th International Conference on Complexity, 2019

2018
XACML for Building Access Control Policies in Internet of Things.
Proceedings of the 3rd International Conference on Internet of Things, 2018

2017
An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context.
Telematics Informatics, 2017

A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies.
Telematics Informatics, 2017

2016
Data security in cloud computing.
Proceedings of the Fifth International Conference on Future Communication Technologies, 2016

2015
Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud.
Proceedings of the Enterprise Security - Second International Workshop, 2015


  Loading...