default search action
Sherali Zeadally
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j387]Adnan Akhunzada, Ahmad Sami Al-Shamayleh, Sherali Zeadally, Ahmad Almogren, Ahmad Adel Abu Shareha:
Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles. Comput. Electr. Eng. 119: 109609 (2024) - [j386]Michail Tsikerdekis, Sherali Zeadally, Iyad A. Katib:
Defenses Against Artificial Intelligence Attacks. Computer 57(11): 49-59 (2024) - [j385]Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A survey on security and cryptographic perspective of Industrial-Internet-of-Things. Internet Things 25: 101037 (2024) - [j384]Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Siva Sai, Jiacheng Wang, Sherali Zeadally, Amir Hussain, Fei Richard Yu, Mohsen Guizani, Dusit Niyato:
Beyond Reality: The Pivotal Role of Generative AI in the Metaverse. IEEE Internet Things Mag. 7(4): 126-135 (2024) - [j383]Muna Al-Hawawreh, Zubair A. Baig, Sherali Zeadally:
AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions. IEEE Internet Things Mag. 7(4): 136-142 (2024) - [j382]Merwa Mehmood, Zubair A. Baig, Naeem Syed, Sherali Zeadally:
The Role of Rule Mining in Generating Synthetic Cyber-Physical System Attack Samples. IEEE Internet Things Mag. 7(6): 14-19 (2024) - [j381]Jacques Bou Abdo, Sherali Zeadally:
Disposable identities: Solving web tracking. J. Inf. Secur. Appl. 84: 103821 (2024) - [j380]Rejab Hajlaoui, Tarek Moulahi, Salah Zidi, Salim El Khediri, Bechir Alaya, Sherali Zeadally:
Towards smarter cyberthreats detection model for industrial internet of things (IIoT) 4.0. J. Ind. Inf. Integr. 39: 100595 (2024) - [j379]Sooeon Lee, Seungheyon Lee, Hyunbum Kim, Sherali Zeadally:
Fold on Fold Surveillance and Detection Against Non-Biased Penetrations in Layered Complex Infrastructures. IEEE Netw. 38(6): 468-475 (2024) - [j378]Ikram Ud Din, Wajahat Ali, Ahmad Almogren, Iehab Al Rassan, Sherali Zeadally:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things. Secur. Priv. 7(3) (2024) - [j377]Kaige Zhu, Zhenjiang Zhang, Sherali Zeadally, Feng Sun:
Learning to Optimize Workflow Scheduling for an Edge-Cloud Computing Environment. IEEE Trans. Cloud Comput. 12(3): 897-912 (2024) - [j376]Wenyu Zhang, Kaiyuan Bai, Sherali Zeadally, Haijun Zhang, Hua Shao, Hui Ma, Victor C. M. Leung:
DeepMA: End-to-End Deep Multiple Access for Wireless Image Transmission in Semantic Communication. IEEE Trans. Cogn. Commun. Netw. 10(2): 387-402 (2024) - [j375]Ali Ranjha, Muhammad Awais Javed, Md. Jalil Piran, Muhammad Asif, Mostafa Hussien, Sherali Zeadally, Jaroslav Frnda:
Toward Facilitating Power Efficient URLLC Systems in UAV Networks Under Jittering. IEEE Trans. Consumer Electron. 70(1): 3031-3041 (2024) - [j374]Amitkumar Vidyakant Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad A. Katib:
6G for intelligent transportation systems: standards, technologies, and challenges. Telecommun. Syst. 86(2): 241-268 (2024) - [j373]Mritunjay Shall Peelam, Naren, Mehul Gera, Vinay Chamola, Sherali Zeadally:
A Review on Emergency Vehicle Management for Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 25(11): 15229-15246 (2024) - [c57]Ayoub Wehby, Sherali Zeadally, Rida Khatoun, Mohammed Lamine Bouchouia, Ahmad Fadlallah:
How Does Distributed Denial of Service Affect the Connected Cars Environment? CoDIT 2024: 164-170 - [i16]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Resource Optimization in UAV-assisted IoT Networks: The Role of Generative AI. CoRR abs/2405.03863 (2024) - 2023
- [j372]Sri Harsha Mekala, Zubair A. Baig, Adnan Anwar, Sherali Zeadally:
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions. Comput. Commun. 208: 294-320 (2023) - [j371]Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, Walid Fahs, Ali El Attar:
Detecting DDoS attacks using adversarial neural network. Comput. Secur. 127: 103117 (2023) - [j370]Badis Hammi, Sherali Zeadally:
Software Supply-Chain Security: Issues and Countermeasures. Computer 56(7): 54-66 (2023) - [j369]Wali Ullah Khan, Muhammad Awais Javed, Sherali Zeadally, Eva Lagunas, Symeon Chatzinotas:
Intelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges. IEEE Commun. Stand. Mag. 7(3): 32-39 (2023) - [j368]Badis Hammi, Sherali Zeadally, Jamel Nebhen:
Security Threats, Countermeasures, and Challenges of Digital Supply Chains. ACM Comput. Surv. 55(14s): 316:1-316:40 (2023) - [j367]Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions. Digit. Commun. Networks 9(1): 79-89 (2023) - [j366]Sandeep Verma, Sakshi Bhatia, Sherali Zeadally, Satnam Kaur:
Fuzzy-based techniques for clustering in wireless sensor networks (WSNs): Recent advances, challenges, and future directions. Int. J. Commun. Syst. 36(16) (2023) - [j365]Alfredo J. Perez, Farhan Siddiqui, Sherali Zeadally, Derek Lane:
A review of IoT systems to enable independence for the elderly and disabled individuals. Internet Things 21: 100653 (2023) - [j364]Anjum Mohd Aslam, Rajat Chaudhary, Aditya Bhardwaj, Ishan Budhiraja, Neeraj Kumar, Sherali Zeadally:
Metaverse for 6G and Beyond: The Next Revolution and Deployment Challenges. IEEE Internet Things Mag. 6(1): 32-39 (2023) - [j363]Badis Hammi, Sherali Zeadally, Alfredo J. Perez:
Non-Fungible Tokens: A Review. IEEE Internet Things Mag. 6(1): 46-50 (2023) - [j362]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Toward Performance and Energy-Efficient Edge-of-Things. IT Prof. 25(1): 17-23 (2023) - [j361]Zubair A. Baig, Sri Harsha Mekala, Sherali Zeadally:
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors. IT Prof. 25(5): 37-44 (2023) - [j360]Michail Tsikerdekis, Sherali Zeadally:
Misinformation Detection Using Deep Learning. IT Prof. 25(5): 57-63 (2023) - [j359]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Space-aerial-ground-sea integrated networks: Resource optimization and challenges in 6G. J. Netw. Comput. Appl. 215: 103647 (2023) - [j358]Alfredo J. Perez, Sherali Zeadally, David Kingsley Tan:
Detecting Mobile Malware Associated With Global Pandemics. IEEE Pervasive Comput. 22(4): 45-54 (2023) - [j357]Nouman Bashir, Saadi Boudjit, Gabriel Dauphin, Sherali Zeadally:
An obstacle avoidance approach for UAV path planning. Simul. Model. Pract. Theory 129: 102815 (2023) - [j356]Wenyu Zhang, Sherali Zeadally, Wei Li, Haijun Zhang, Jingyi Hou, Victor C. M. Leung:
Edge AI as a Service: Configurable Model Deployment and Delay-Energy Optimization With Result Quality Constraints. IEEE Trans. Cloud Comput. 11(2): 1954-1969 (2023) - [j355]Wenyu Zhang, Sherali Zeadally, Huan Zhou, Haijun Zhang, Ning Wang, Victor C. M. Leung:
Joint Service Quality Control and Resource Allocation for Service Reliability Maximization in Edge Computing. IEEE Trans. Commun. 71(2): 935-948 (2023) - [j354]Zaiba Shah, Umer Javed, Muhammad Naeem, Sherali Zeadally, Waleed Ejaz:
Mobile Edge Computing (MEC)-Enabled UAV Placement and Computation Efficiency Maximization in Disaster Scenario. IEEE Trans. Veh. Technol. 72(10): 13406-13416 (2023) - [c56]Rafael Veiga, Rodrigo Flexa, Lucas Bastos, Iago Medeiros, Denis Rosário, Eduardo Cerqueira, Sherali Zeadally, Leandro Villas:
A Federated Learning Approach for Continuous User Identification. WF-IoT 2023: 1-6 - [i15]Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Naga Siva Sai Reddy, Jiacheng Wang, Sherali Zeadally, Amir Hussain, F. Richard Yu, Mohsen Guizani, Dusit Niyato:
Beyond Reality: The Pivotal Role of Generative AI in the Metaverse. CoRR abs/2308.06272 (2023) - [i14]Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, Sherali Zeadally, Jon Crowcroft, Lianyong Qi, Shengjun Xue:
Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges. CoRR abs/2310.17260 (2023) - [i13]Daksh Dave, Vinay Chamola, Sandeep Joshi, Sherali Zeadally:
DroneOptiNet: A Framework for Optimal Drone-based Load Redistribution Mechanism for 5G and Beyond Solar Small Cell Networks. CoRR abs/2311.12944 (2023) - 2022
- [j353]Ouadoudi Zytoune, Hacène Fouchal, Sherali Zeadally:
A realistic relay selection scheme for cooperative MIMO networks. Ad Hoc Networks 124: 102706 (2022) - [j352]Oladayo Bello, Sherali Zeadally:
Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities. Ad Hoc Networks 135: 102933 (2022) - [j351]Mario Collotta, Ilsun You, Sherali Zeadally, Fei Song:
Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn). Comput. Electr. Eng. 97: 107656 (2022) - [j350]Adel Thaljaoui, Salim El Khediri, Sherali Zeadally, Abdullah Alourani:
Remote monitoring system using Light Fidelity and InfraRed technologies. Comput. Electr. Eng. 101: 108073 (2022) - [j349]Muhammad Taimoor Khan, Adnan Akhunzada, Sherali Zeadally:
Proactive Defense for Fog-to-Things Critical Infrastructure. IEEE Commun. Mag. 60(12): 44-49 (2022) - [j348]Rafael S. Lopes, Denis Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira, Sherali Zeadally:
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks. Comput. Networks 218: 109389 (2022) - [j347]Nouman Bashir, Saadi Boudjit, Sherali Zeadally:
A closed-loop control architecture of UAV and WSN for traffic surveillance on highways. Comput. Commun. 190: 78-86 (2022) - [j346]Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen:
Survey on smart homes: Vulnerabilities, risks, and countermeasures. Comput. Secur. 117: 102677 (2022) - [j345]Alfredo J. Perez, Sherali Zeadally:
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions. Comput. Sci. Rev. 43: 100450 (2022) - [j344]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j343]Jacques Bou Abdo, Sherali Zeadally:
Multi-utility framework: blockchain exchange platform for sustainable development. Int. J. Pervasive Comput. Commun. 18(4): 388-406 (2022) - [j342]Tu N. Nguyen, Sherali Zeadally, Abhijith B. Vuduthala:
Cyber-Physical Cloud Manufacturing Systems With Digital Twins. IEEE Internet Comput. 26(3): 15-21 (2022) - [j341]Usman Mahmood Malik, Muhammad Awais Javed, Sherali Zeadally, Saif ul Islam:
Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities. IEEE Internet Things J. 9(16): 14572-14594 (2022) - [j340]Faisal Karim Shaikh, Sarang Karim, Sherali Zeadally, Jamel Nebhen:
Recent Trends in Internet-of-Things-Enabled Sensor Technologies for Smart Agriculture. IEEE Internet Things J. 9(23): 23583-23598 (2022) - [j339]Dwij Mehta, Aditya Mehta, Pratik Narang, Vinay Chamola, Sherali Zeadally:
Deep Learning Enhanced UAV Imagery for Critical Infrastructure Protection. IEEE Internet Things Mag. 5(2): 30-34 (2022) - [j338]Faisal Karim Shaikh, Mohsin Ali Memon, Naeem Ahmed Mahoto, Sherali Zeadally, Jamel Nebhen:
Artificial Intelligence Best Practices in Smart Agriculture. IEEE Micro 42(1): 17-24 (2022) - [j337]Biwen Chen, Libing Wu, Sherali Zeadally, Debiao He:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans. Cloud Comput. 10(1): 322-333 (2022) - [j336]Badis Hammi, Sherali Zeadally, Yves-Christian Adja Elloh, Manlio Del Giudice, Jamel Nebhen:
Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Trans. Engineering Management 69(6): 3710-3725 (2022) - [j335]Sandeep Verma, Sherali Zeadally, Satnam Kaur, Ajay Kumar Sharma:
Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(8): 13473-13481 (2022) - [j334]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Secure Transmission in Cellular V2X Communications Using Deep Q-Learning. IEEE Trans. Intell. Transp. Syst. 23(10): 17167-17176 (2022) - [j333]Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen:
Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Trans. Intell. Transp. Syst. 23(10): 18273-18287 (2022) - [j332]Jun Huang, Qiang Duan, Cong-Cong Xing, Bo Gu, Guodong Wang, Sherali Zeadally, Erich J. Baker:
A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3501-3515 (2022) - [j331]Tu N. Nguyen, Sherali Zeadally:
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions. ACM Trans. Internet Techn. 22(2): 48:1-48:15 (2022) - [j330]Feng Sun, Zhenjiang Zhang, Sherali Zeadally, Guangjie Han, Shiyuan Tong:
Edge Computing-Enabled Internet of Vehicles: Towards Federated Learning Empowered Scheduling. IEEE Trans. Veh. Technol. 71(9): 10088-10103 (2022) - [j329]Abir Mchergui, Tarek Moulahi, Sherali Zeadally:
Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs). Veh. Commun. 34: 100403 (2022) - [j328]Adamu Sani Yahaya, Nadeem Javaid, Sherali Zeadally, Hassan Farooq:
Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks. Veh. Commun. 37: 100502 (2022) - [j327]Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, Jamal Haydar:
A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Veh. Commun. 38: 100541 (2022) - [j326]Jean Moraes, Helder M. N. S. Oliveira, Eduardo Cerqueira, Cristiano Both, Sherali Zeadally, Denis Rosário:
Evaluation of an Adaptive Resource Allocation for LoRaWAN. J. Signal Process. Syst. 94(1): 65-79 (2022) - [c55]Lucas Bastos, Bruno S. Martins, Iago Medeiros, Augusto Neto, Sherali Zeadally, Denis Rosário, Eduardo Cerqueira:
Ensemble Learning Method for Human Identification in Wearable Devices. IWCMC 2022: 1052-1057 - [c54]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks. MILCOM 2022: 7-12 - [i12]Sabah Suhail, Sherali Zeadally, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Security Attacks and Solutions for Digital Twins. CoRR abs/2202.12501 (2022) - [i11]Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions. CoRR abs/2203.03717 (2022) - 2021
- [j325]Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - [j324]Teodora Sanislav, George Dan Mois, Sherali Zeadally, Silviu C. Folea:
Energy Harvesting Techniques for Internet of Things (IoT). IEEE Access 9: 39530-39549 (2021) - [j323]Chun-Wei Tsai, Mu-Yen Chen, Francesco Piccialli, Tie Qiu, Jason J. Jung, Patrick C. K. Hung, Sherali Zeadally:
IEEE Access Special Section Editorial: Data Mining for Internet of Things. IEEE Access 9: 90418-90427 (2021) - [j322]Felipe Sampaio Dantas da Silva, Emidio P. Neto, Helder M. N. S. Oliveira, Denis do Rosário, Eduardo Cerqueira, Cristiano Both, Sherali Zeadally, Augusto José Venâncio Neto:
A Survey on Long-Range Wide-Area Network Technology Optimizations. IEEE Access 9: 106079-106106 (2021) - [j321]Eduardo Lima, Jean Moraes, Helder M. N. S. Oliveira, Eduardo Cerqueira, Sherali Zeadally, Denis do Rosário:
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications. Ad Hoc Networks 122: 102598 (2021) - [j320]Mohammad Aazam, Sherali Zeadally, Eduardo Feo Flushing:
Task offloading in edge computing for machine learning-based smart healthcare. Comput. Networks 191: 108019 (2021) - [j319]Yves-Christian Adja Elloh, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally:
A blockchain-based certificate revocation management and status verification system. Comput. Secur. 104: 102209 (2021) - [j318]Malcolm Shore, Sherali Zeadally, Astha Keshariya:
Zero Trust: The What, How, Why, and When. Computer 54(11): 26-35 (2021) - [j317]Maxim Chernyshev, Zubair Ahmed Baig, Sherali Zeadally:
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface. Computer 54(11): 47-57 (2021) - [j316]Qinwen Hu, Muhammad Rizwan Asghar, Sherali Zeadally:
Blockchain-based public ecosystem for auditing security of software applications. Computing 103(11): 2643-2665 (2021) - [j315]Rasheed Hussain, Fatima Hussain, Sherali Zeadally, JooYoung Lee:
On the Adequacy of 5G Security for Vehicular Ad Hoc Networks. IEEE Commun. Stand. Mag. 5(1): 32-39 (2021) - [j314]Gerasimos Razis, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. ACM Comput. Surv. 53(1): 7:1-7:38 (2021) - [j313]Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo, Sherali Zeadally:
Deep learning support for intelligent transportation systems. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j312]Vikas Hassija, Sherali Zeadally, Ishan Jain, Aman Tahiliani, Vinay Chamola, Shashank Gupta:
Framework for determining the suitability of blockchain: Criteria and issues to consider. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j311]Matthew Carter, Michail Tsikerdekis, Sherali Zeadally:
Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks. IEEE Internet Comput. 25(2): 73-83 (2021) - [j310]Sherali Zeadally, Oladayo Bello:
Harnessing the power of Internet of Things based connectivity to improve healthcare. Internet Things 14: 100074 (2021) - [j309]Sherali Zeadally, Ashok Kumar Das, Nicolas Sklavos:
Cryptographic technologies and protocol standards for Internet of Things. Internet Things 14: 100075 (2021) - [j308]Farhan Siddiqui, Jake Beley, Sherali Zeadally, Grant Braught:
Secure and lightweight communication in heterogeneous IoT environments. Internet Things 14: 100093 (2021) - [j307]Joel J. P. C. Rodrigues, Korhan Cengiz, Muhammad Awais Javed, Sudeep Tanwar, Zhaolong Ning, Sherali Zeadally:
GUEST EDITORIAL: Internet of Medical Things in the Context of COVID-19. IEEE Internet Things Mag. 4(2): 2-3 (2021) - [j306]Rajesh Gupta, Pronaya Bhattacharya, Sudeep Tanwar, Neeraj Kumar, Sherali Zeadally:
GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. IEEE Internet Things Mag. 4(4): 60-66 (2021) - [j305]Jacques Bou Abdo, Sherali Zeadally:
Neural network-based blockchain decision scheme. Inf. Secur. J. A Glob. Perspect. 30(3): 173-187 (2021) - [j304]Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. J. Inf. Secur. Appl. 58: 102782 (2021) - [j303]Leila Ismail, Sherali Zeadally:
Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI). IT Prof. 23(4): 36-43 (2021) - [j302]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Power and Performance Efficient SDN-Enabled Fog Architecture. IT Prof. 23(6): 24-30 (2021) - [j301]Shumaila Javaid, Zhenqiang Wu, Zara Hamid, Sherali Zeadally, Hamza Fahim:
Temperature-aware routing protocol for Intrabody Nanonetworks. J. Netw. Comput. Appl. 183-184: 103057 (2021) - [j300]Insaf Ullah, Sherali Zeadally, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak:
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsystems 81: 103477 (2021) - [j299]Hesham El-Sayed, Sherali Zeadally, Manzoor Ahmed Khan, Henry Alexander Ignatious:
Edge-centric trust management in vehicular networks. Microprocess. Microsystems 84: 104271 (2021) - [j298]Muhammad Awais Javed, Sherali Zeadally:
AI-Empowered Content Caching in Vehicular Edge Computing: Opportunities and Challenges. IEEE Netw. 35(3): 109-115 (2021) - [j297]Alfredo J. Perez, Sherali Zeadally:
Recent Advances in Wearable Sensing Technologies. Sensors 21(20): 6828 (2021) - [j296]Rajesh Gupta, Mohil Maheshkumar Patel, Sudeep Tanwar, Neeraj Kumar, Sherali Zeadally:
Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks. IEEE Trans. Green Commun. Netw. 5(4): 1712-1721 (2021) - [j295]Shidrokh Goudarzi, Mohammad Hossein Anisi, Seyed Ahmad Soleymani, Masri Ayob, Sherali Zeadally:
An IoT-Based Prediction Technique for Efficient Energy Consumption in Buildings. IEEE Trans. Green Commun. Netw. 5(4): 2076-2088 (2021) - [j294]Waleed Ejaz, Muhammad Naeem, Sherali Zeadally:
On-Demand Sensing and Wireless Power Transfer for Self-Sustainable Industrial Internet of Things Networks. IEEE Trans. Ind. Informatics 17(10): 7075-7084 (2021) - [j293]Rasheed Hussain, JooYoung Lee, Sherali Zeadally:
Trust in VANET: A Survey of Current Solutions and Future Research Opportunities. IEEE Trans. Intell. Transp. Syst. 22(5): 2553-2571 (2021) - [j292]Fushan Wei, Sherali Zeadally, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [j291]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications. IEEE Trans. Intell. Transp. Syst. 22(7): 4064-4072 (2021) - [j290]