Mahmoud Nabil
Orcid: 0000-0003-3059-7912Affiliations:
- North Carolina A&T State University, Greensboro, NC, USA
According to our database1,
Mahmoud Nabil
authored at least 59 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
6
1
4
6
1
6
3
1
1
2
6
3
7
2
4
3
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Securing Smart Grid False Data Detectors Against White-Box Evasion Attacks Without Sacrificing Accuracy.
IEEE Internet Things J., October, 2024
AdaptEdge: Targeted Universal Adversarial Attacks on Time Series Data in Smart Grids.
IEEE Trans. Smart Grid, September, 2024
Trojan Attack and Defense for Deep Learning-Based Navigation Systems of Unmanned Aerial Vehicles.
IEEE Access, 2024
NCAT12-DET: A New Benchmark Dataset for Surface Defect Detection and a Comparative Study.
IEEE Access, 2024
Efficient and Privacy-Preserving ConvLSTM-Based Detection of Electricity Theft Cyber-Attacks in Smart Grids.
IEEE Access, 2024
Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication.
IEEE Access, 2024
Decentralized Federated Learning Using the Metropolis-Hastings for Highly Dynamic UAVs.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Poisoning Attack Mitigation for Privacy-Preserving Federated Learning-Based Energy Theft Detection.
Proceedings of the IEEE International Conference on Communications, 2024
2023
IEEE Trans. Mob. Comput., 2023
Local (Per-Input) Robustness Based Guided Adversarial training of Deep Neural Networks.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023
Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023
A Discriminative DeepLab Model (DDLM) for Surface Anomaly Detection and Localization.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023
2022
A Review on Human-Machine Trust Evaluation: Human-Centric and Machine-Centric Perspectives.
IEEE Trans. Hum. Mach. Syst., 2022
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Accurate and Privacy-Preserving Person Localization Using Federated-Learning and the Camera Surveillance Systems of Public Places.
IEEE Access, 2022
Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022
Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022
2021
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services.
IEEE Trans. Dependable Secur. Comput., 2021
Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings.
IEEE Syst. J., 2021
Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks.
IEEE Internet Things J., 2021
Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics.
IEEE Access, 2021
Antenna Beamwidth Optimization in Directional Device-to-Device Communication Using Multi-Agent Deep Reinforcement Learning.
IEEE Access, 2021
A Distributed Surveillance System With Full Coverage Guarantee Using Positive Orthogonal Codes.
IEEE Access, 2021
Efficient Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles Using Deep Learning.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021
Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021
2020
IEEE CAA J. Autom. Sinica, 2020
A Blockchain-based Medical Data Marketplace with Trustless Fair Exchange and Access Control.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks.
IEEE Internet Things J., 2019
MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks.
IEEE Internet Things J., 2019
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid.
CoRR, 2019
PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks.
IEEE Access, 2019
EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks.
IEEE Access, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units.
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units.
CoRR, 2018
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks.
CoRR, 2018
Efficient and Privacy-Preserving Ride SharingOrganization for Transferable andNon-Transferable Services.
CoRR, 2018
Proceedings of the 25th International Conference on Telecommunications, 2018
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters.
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
2016
Proceedings of the 10th International Workshop on Semantic Evaluation, 2016
2015
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015
2014
2012
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012