{"id":486,"date":"2024-07-02T03:30:12","date_gmt":"2024-07-02T03:30:12","guid":{"rendered":"https:\/\/amsaad.com\/?page_id=486"},"modified":"2024-07-03T14:02:36","modified_gmt":"2024-07-03T14:02:36","slug":"publications-2","status":"publish","type":"page","link":"https:\/\/wright-smart-lab.site\/?page_id=486","title":{"rendered":"Publications"},"content":{"rendered":"<h2>Published Journal Papers<\/h2>\n<p><!--more--><\/p>\n<p><strong><em><u>Note:<\/u> <\/em><\/strong><em>The following papers are already published. Dr. Amsaad\u2019s name is highlighted in <strong>bold<\/strong>. His graduate student mentees and visiting scholars who worked in his lab are highlighted in <u>italic and underlined<\/u><\/em>.<\/p>\n<ol>\n<li><em><u>Brian Hildebrand<\/u><\/em>, Mohamed Baza, Tara Salman, <em><u>Simra Tabassum<\/u><\/em>, Bharath Konatham, <strong>Fathi Amsaad<\/strong>, Abdul Razaque, \u201cA comprehensive review on blockchains for Internet of Vehicles: Challenges and directions,\u201d in <em>Computer Science Review (Elsevier)<\/em>, 2023. [Q1 Elsevier journal, IF = 12.9].<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\"><strong>(Link:) <\/strong><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S157401372300014X\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S157401372300014X<\/a><\/p>\n<ol start=\"2\">\n<li>Al-Eidi, <strong>Fathi Amsaad<\/strong>, O. Darwish, Y. Tashtoush, A. Alqahtani and <em><u>Niveshitha Niveshitha<\/u><\/em>, \u201cComparative AnalysisStudy for Air Quality Prediction in Smart Cities Using Regression Techniques,\u201d in <em>IEEE Access<\/em>, vol. 11, pp. 115140-115149, 2023. [Q1 IEEE Journal, IF = 3.9].<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\"><strong>(Link:) <\/strong>https:\/\/ieeexplore.ieee.org\/document\/10274948<\/p>\n<ol start=\"3\">\n<li>Abdul Razaque, Mohamed Ben Haj Frej, Gulnara Bektemyssova, <strong>Fathi Amsaad<\/strong>, Muder Almiani, Aziz Alotaibi, NZ Jhanjhi, Saule Amanzholova, Majid Alshammari, \u201cCredit Card-Not-Present Fraud Detection and Prevention Using BigData Analytics Algorithms,\u201d <em>Applied Sciences<\/em>, [Q2 Journal, IF = 2.9]. <strong>(Link:) <\/strong><a href=\"http:\/\/www.mdpi.com\/2076-3417\/13\/1\/57\">https:\/\/www.mdpi.com\/2076-3417\/13\/1\/57<\/a><\/li>\n<li>Abdul Razaque, <strong>Fathi Amsaad<\/strong>, <em><u>Musbah Abdulgader<\/u><\/em>, Bandar Alotaibi, Fawaz Alsolami, Duisen Gulsezim, andSaraju Mohanty, \u201cA Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare,\u201d in <em>IEEE Internet of Things Journal<\/em>, vol. 9, no. 22, pp. 22434-22452, Nov. 15, 2022. [Q1 IEEE Journal, five years IF = 11.043]. <span style=\"font-size: 1rem; letter-spacing: 0.02em;\">https:\/\/ieeexplore.ieee.org\/document\/9669196<\/span><\/li>\n<li>Abdul Razaque, Yaser Jararweh, Aziz Alotaibi, <strong>Fathi Amsaad<\/strong>, Bandar Alotaibi, Munif Alotaibi, \u201cA blockchain-enabled framework for securing connected consumer electronics against wireless attacks,\u201d <em>Journal of Simulation ModellingPractice and Theory (Elsevier)<\/em>, [Q1 Elsevier Journal, IF = 4.199]. <strong>(Link:) <\/strong><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1569190X22001228\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1569190X22001228<\/a><\/li>\n<li>Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, <strong>Fathi Amsaad<\/strong>, Ansagan Manasov, Salim Hariri, Banu Yergaliyeva, and Aziz Alotaibi, \u201cA blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection: Implications for Online Content Credibility,\u201d in <em>IEEE Access<\/em>, vol. 10, pp. <span style=\"font-size: 1rem; letter-spacing: 0.02em;\">3144-3163, 2022. [Q1 IEEE Journal, IF = 3.9]. https:\/\/ieeexplore.ieee.org\/document\/9656746<\/span><\/li>\n<li>Malik, S. Sahoo, N. Z. Jhanjhi, S. Bhatia, and <strong>Fathi Amsaad<\/strong>, \u201cE-Learning Course Recommender System Using Collaborative Filtering Models,\u201d <em>Electronics<\/em>, 2022. [Q2 Journal, IF=2.69]. <a style=\"font-size: 1rem; letter-spacing: 0.02em;\" href=\"http:\/\/www.mdpi.com\/2079-9292\/12\/1\/157\">https:\/\/www.mdpi.com\/2079-9292\/12\/1\/157<\/a><\/li>\n<li>Kumar, N. Malik, J. Singla, N. Z. Jhanjhi, <strong>Fathi Amsaad<\/strong>, and Abdul Razaque, \u201cLight Weight Authentication Scheme forSmart Home IoT Devices,\u201d <em>Cryptography<\/em>, 2022. [Q2 Journal, IF = 2.3].<a href=\"http:\/\/www.mdpi.com\/2410-387X\/6\/3\/37\">https:\/\/www.mdpi.com\/2410-387X\/6\/3\/37<\/a><\/li>\n<li><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">Mamoona Humayun, Noor Zaman Jhanjhi, Mahmood Niazi, <\/span><strong style=\"font-size: 1rem; letter-spacing: 0.02em;\">Fathi Amsaad<\/strong><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">, and Isma Masood, \u201cSecuring DrugDistribution Systems from Tampering Using Blockchain,\u201d <\/span><em style=\"font-size: 1rem; letter-spacing: 0.02em;\">Electronics<\/em><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">, [Q2 Journal, IF = 2.69].<\/span><a style=\"font-size: 1rem; letter-spacing: 0.02em;\" href=\"http:\/\/www.mdpi.com\/2079-9292\/11\/8\/1195\">https:\/\/www.mdpi.com\/2079-9292\/11\/8\/1195<\/a><\/li>\n<li><strong>Fathi Amsaad<\/strong>, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Selcuk Kose, Mohamed Mahmoud, and WaleedAlasmary, \u201cEnhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-AssistedSecurity,\u201d in <em>IEEE Access<\/em>, 9, pp. 136792-136810, 2021. [Q1 IEEE Journal, IF = 3.9].<span style=\"font-size: 1rem; letter-spacing: 0.02em;\">https:\/\/ieeexplore.ieee.org\/document\/9557269<\/span><\/li>\n<li><strong>Fathi Amsaad<\/strong> and K\u00a8ose, \u201cA Secure Lightweight Hardware-assisted Charging Coordination AuthenticationFramework for Trusted Smart Grid Energy Storage Units,\u201d <em>Springer Nature Computer Science<\/em>, 2021. [Q1 Springer Journal, IF = 1.9].<span style=\"font-size: 1rem; letter-spacing: 0.02em;\">https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00840-0<\/span><\/li>\n<li><em><u>A. Shafee<\/u> <\/em>M. M. Fouda, M. M. E. A. Mahmoud, A. J. Aljohani, W. Alasmary, and <strong>Fathi Amsaad<\/strong>, \u201cDetection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning,\u201d in <em>IEEE Access<\/em>, vol. 8, pp. 179400-179414, 2020. [Q1 IEEE Journal, IF = 3.9].<span style=\"font-size: 1rem; letter-spacing: 0.02em;\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9210521<\/span><\/li>\n<li>Razaque, <strong>Fathi Amsaad<\/strong>, S. Hariri, M. Almasri, S. S. Rizvi and M. B. H. Frej, \u201cEnhanced Grey Risk Assessment Model for Support of Cloud Service Provider,\u201d in <em>IEEE Access<\/em>, vol. 8, pp. 80812-80826, 2020. [Q1 IEEE Journal, IF = 3.9] https:\/\/ieeexplore.ieee.org\/abstract\/document\/9064787<\/li>\n<li>Abdul Razaque, <strong>Fathi Amsaad<\/strong>, Meer Jaro Khan, Salim Hariri, Shujing Chen, Chen Siting, \u201cSurvey: CybersecurityVulnerabilities, Attacks and Solutions in the Medical Domain,\u201d in <em>IEEE Access<\/em>, 7,168774-168797, 2019. [Q1 IEEE Journal, IF = 3.9]<strong>\u00a0<\/strong>https:\/\/ieeexplore.ieee.org\/document\/8888271<\/li>\n<li><strong>Fathi Amsaad<\/strong>, Niamat, A. Dawoud, and S. K\u00a8ose, \u201cReliable Delay based Algorithm to Boost PUF Security againstModeling Attacks,\u201d <em>Information<\/em>, Vol. 9, No. 9, pp. 1\u201315, September 2018. [Q2 Journal, IF =]. <strong>(Link:) <\/strong><a href=\"http:\/\/www.mdpi.com\/2078-2489\/9\/9\/224\">https:\/\/www.mdpi.com\/2078-2489\/9\/9\/224<\/a><\/li>\n<li><u style=\"font-size: 1rem; letter-spacing: 0.02em;\"><em>Azhar<\/em><\/u><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">, <\/span><strong style=\"font-size: 1rem; letter-spacing: 0.02em;\">Fathi Amsaad<\/strong><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">, and S. K\u00a8ose, \u201cDuty Cycle-based Controlled Physical Unclonable Function,\u201d <\/span><em style=\"font-size: 1rem; letter-spacing: 0.02em;\">IEEE Transactionson Very Large-Scale Integration (VLSI) Systems<\/em><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">, Vol. 26, No. 9, pp. 1647\u20131658, September 2018. [Q1 IEEE Journal, IF = 2.8]. <\/span><strong style=\"font-size: 1rem; letter-spacing: 0.02em;\">(Link): <\/strong><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">https:\/\/ieeexplore.ieee.org\/document\/8365151<\/span><\/li>\n<\/ol>\n<h2>\u00a02024 Under Review, Preprint, Archived in IEEE TechRxiv Journals<\/h2>\n<p><strong><em><u>Note:<\/u> <\/em><\/strong><em>The following papers are still under peer review process. Some of the work has been published in preprint or archived in IEEETechRxiv journals. Dr. Amsaad\u2019s name is highlighted in <strong>bold<\/strong>. His graduate student mentees are highlighted in <u>italic andunderlined<\/u>. These documents are submitted in 2024.<\/em><\/p>\n<ol>\n<li><em><u>Ashutosh Ghimire<\/u><\/em>, Tanvir Hossain, Tamzidul Hoque, and <strong>Fathi Amsaad<\/strong>, \u201cAI-Driven Security Approach to EnhanceGolden Free Hardware Trojan Localization and Detection for Assure and Trusted IC Microelectronics,\u201d <em>IEEETransactions on Very Large-Scale Integration (TVLSI)<\/em>, [Q1\/Q2 IEEE Journal, IF = 2.8].<\/li>\n<li><em><u>Bharath Konatham<\/u><\/em>, <em><u>Tabassum Simra<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, Mohamed Ibrahem, and Noor Zaman, \u201cA Secure Hybrid Deep Learning Technique for Anomaly Detection in IIoT Edge Computing,\u201d <em>IEEE Transactions on Industrial Electronics<\/em>. [Q1 IEEE Journal, IF = 7.7].<strong>(Link:) <\/strong>https:\/\/shorturl.at\/NX3KA<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><em><u>Ashutosh Ghimire<\/u><\/em>, <em><u>Mohammed Alkurdi<\/u><\/em>, Md Tauhidur Rahman, Saraju Mohanty, and <strong>Fathi Amsaad<\/strong>, \u201cA Golden-FreeUnsupervised ML-Assisted Security Approach for Detection of IC Hardware Trojans,\u201d <em>ACM Journal on Emerging Technologies in Computing Systems<\/em>. [Q2 ACM Journal, IF = 2.2].<\/li>\n<li><em><u>K M Tawsik Jawad<\/u><\/em>, <em><u>Anusha Verma<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, \u201cAI-Driven Predictive Analytics Approach for Early Prognosis ofChronic Kidney Disease Using Ensemble Learning and Explainable AI\u201d <em>IEEE Journal of Translational Engineering in Health &amp; Medicine (JTEHM)<\/em>, 2024, [Q1 IEEE Journal, IF = 3.4].<\/li>\n<li><em><u>Ashutosh Ghimire<\/u><\/em>, <em><u>Mohammed Alkurdi<\/u><\/em>, Saraju Mohanty, and <strong>Fathi Amsaad<\/strong>, \u201cAI-Enabled Image Processing Approachfor Efficient Clustering and Identification of Hardware Trojans,\u201d <em>Springer Nature Computer Science<\/em>. [Q1 Springer Journal, IF = 1.9].<\/li>\n<li><em><u>Harshdeep Singh<\/u><\/em>, <em><u>Ashutosh Ghimire<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, \u201cAI-Driven SRAM PUF Manufacturer Identification forTrusted IC Supply Chain Systems,\u201d <em>IEEE System Journal<\/em>. [Q1 IEEE Journal, IF = 1].<\/li>\n<li><em><u>Niraj Prasad Bhatta<\/u><\/em>, <em><u>Harshdeep Singh<\/u><\/em>, Md Tauhidur Rahman, and <strong>Fathi Amsaad<\/strong>, \u201cAnalyzing Aging Effects on SRAM PUFs: Implications for Security and Reliability,\u201d <em>Journal of Hardware and System Security (HaSS): Trustworthy Microelectronic<\/em>. (Final Round of Review). <a style=\"font-size: 1rem; letter-spacing: 0.02em;\" href=\"http:\/\/www.researchsquare.com\/article\/rs-3290189\/v1\">https:\/\/www.researchsquare.com\/article\/rs-3290189\/v1<\/a><\/li>\n<\/ol>\n<ol start=\"8\">\n<li>textit<u>Harshdeep Singh<\/u>, <em><u>Niraj Prasad Bhatta<\/u><\/em>, Md Tauhidur Rahman, and <strong>Fathi Amsaad<\/strong>, \u201cAccelerated Aging Effects on SRAM PUF reliability at various Temperature and Voltage conditions,\u201d <em>Journal of Hardware and System Security(HaSS): Trustworthy Microelectronic<\/em>. (Final Round of Review).\u00a0<a href=\"http:\/\/www.researchsquare.com\/article\/rs-3290189\/v1\">https:\/\/www.researchsquare.com\/article\/rs-3290189\/v1.<\/a><\/li>\n<li><em><u>Tabassum Simra<\/u><\/em>, <em><u>Bharath Konatham<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, and Mohamed Ibrahem, \u201dA<\/li>\n<\/ol>\n<p>Knowledge-Based Federated Deep Learning Approach for IoT Edge Security and Privacy\u201d, <em>Computer Communications<\/em>. [Q1 Elsevier Journal, IF = 6.0].<\/p>\n<ol start=\"10\">\n<li><em><u>Khaled Saleh<\/u><\/em>, <strong>Fathi Amsaad<\/strong>, Dirar Darwesh, Omar Darwish, \u201cSoftware and Hardware based Obfuscation and De-obfuscation Techniques for Secure and Trusted System: A Comprehensive Study,\u201d <em>Computer Science Review (Elsevier)<\/em>. [Q1 Elsevier Journal, IF = 12.9].<\/li>\n<li><em><u>Niveshitha Niveshitha<\/u><\/em>, Ahmed Sherif, Noor Zaman Jhanjhi, and <strong>Fathi Amsaad<\/strong>, \u201cAI-assisted Distributed CloudServices Framework for Enhanced Safety in Urban Smart Cities Environment,\u201d <em>Internet of Things<\/em>, 2024. [Q1 Elsevier Journal, IF = 5.9, Cite Score = 12.1]<\/li>\n<li><em><u>Vishnu Baligodugula<\/u><\/em>, <em><u>Ashutosh Ghimire<\/u><\/em>, Vincent Schmidt, and <strong>Fathi Amsaad<\/strong>, \u201cDistributed AI for EnhancedUnsupervised Clustering in Machine Learning,\u201d <em>IEEE Access<\/em>, [Q1 IEEE Journal, IF = 3.9].<\/li>\n<li><em><u>Ashutosh Ghimire<\/u> <\/em>and <strong>Fathi Amsaad<\/strong>, \u201cA Parallel Approach to Enhance the Performance of Supervised MachineLearning Realized on Multicore Environment,\u201d <em>Machine Learning and Knowledge Extraction<\/em>. [Q1 Journal, IF = 3.9].<\/li>\n<\/ol>\n<h2>Published IEEE Magazine Papers<\/h2>\n<p><strong><em><u>Note:<\/u> <\/em><\/strong><em>The following papers are published in IEEE Magazines. Dr. Amsaad\u2019s name is highlighted in <strong>bold<\/strong>. His graduate student mentees are highlighted in <u>italic and underlined<\/u>.<\/em><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><em><u> Hildebrand<\/u><\/em>, <em><u>A. Ghimire<\/u><\/em>, <strong>F. Amsaad<\/strong>, A. Razaque and S. P. Mohanty, \u201dQuantum communication networks: design,reliability, and security,\u201d <em>in IEEE Potentials<\/em>. [IEEE Magazine, Cite Score = 1.4] <strong>(Link:) <\/strong>https:\/\/ieeexplore-ieee-org.ezproxy.libraries.wright.edu\/document\/10288526<\/li>\n<li><strong>Fathi Amsaad <\/strong>and K\u00a8ose, \u201cA Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities,\u201d <em>in IEEEConsumer Electronics Magazine<\/em>, vol. 10, no. 4, pp. 106-112, 1 July 2021. [Q1 IEEE Magazine, IF = 4.5]. <strong>(Link:) <\/strong>https:\/\/ieeexplore.ieee.org\/document\/9271856<\/li>\n<\/ol>\n<h2><u><\/u>Published Books and Book Chapters<\/h2>\n<p><strong><em><u>Note:<\/u> <\/em><\/strong><em>The following are published work on Books and Book Chapters. Dr. Amsaad\u2019s name is highlighted in<\/em><\/p>\n<p><strong><em>bold<\/em><\/strong><em>. His graduate student mentees are highlighted in <u>italic and underlined<\/u>.<\/em><\/p>\n<h3>\u2022Book1: Advances in Intelligent Systems and Computing<\/h3>\n<p><strong>Book Editors: <\/strong>Sheng-Lung Peng, Noor Zaman Jhanjhi, Souvik Pal, and <strong>Fathi Amsaad Publisher: <\/strong><em>Springer Nature<\/em><\/p>\n<ul>\n<li><strong>Publishing Processing: <\/strong><em>The 3rd International Conference on Mathematical Modeling and Computational Science (ICMMCS 2023)<\/em><\/li>\n<\/ul>\n<h3>Publication Date: 2023<\/h3>\n<p><strong>(Link:) <\/strong>https:\/\/link.springer.com\/book\/10.1007\/978-981-99-3611-3<\/p>\n<h3>\u2022Book2: Cryptographic Methods<\/h3>\n<p><strong>Book Editors: <\/strong>Abdul Razaque, <strong>Fathi Amsaad<\/strong>, and Abrar Alajlan<\/p>\n<p><strong>Publisher: <\/strong><em>WestBow Press<\/em><\/p>\n<h3>Publication Date: 2021<\/h3>\n<p><strong>Issue: <\/strong>ISBN-13: 978-1973694090<\/p>\n<p><a href=\"http:\/\/www.westbowpress.com\/en\/bookstore\/bookdetails\/805984-cryptographic-methods\">https:\/\/www.westbowpress.com\/en\/bookstore\/bookdetails\/805984-cryptographic-methods<\/a><\/p>\n<p style=\"font-weight: 400;\"><strong>Book Chapter1: Fathi Amsaad<\/strong>, <em><u>Brian Hildebrand<\/u><\/em>, Mohamed Baza, Abdul Razaque, \u201cSecure Blind Signature forElectronic Voting and Electronic Cashing Systems: A Survey,\u201d Security and Resilience of Cyber Physical Systems, eBook ISBN (9781003185543), <em>Imprint Chapman and Hall\/CRC<\/em>, 2022. <strong>(Link:)<\/strong>https:\/\/bit.ly\/3VKEOkO<\/p>\n<h2><u><\/u>Published Conference Papers<\/h2>\n<p><strong><em><u>Note:<\/u> <\/em><\/strong><em>The following Peer reviewed Conference Papers are published by IEEE. Dr. Amsaad\u2019s name is highlighted in <strong>bold<\/strong>. Hisgraduate student mentees are highlighted in <u>italic and underlined<\/u>.<\/em><\/p>\n<p><strong><em><u>Note:<\/u> <\/em>Link to All Conference Papers in IEEE Xplore Database: <\/strong>(https:\/\/shorturl.at\/TM4Q3)<\/p>\n<ol>\n<li><em><u> Ghimire<\/u><\/em>, <em><u>M. Alkurdi<\/u><\/em>, and <strong>F. Amsaad<\/strong>, \u201dEnhancing Hardware Trojan Security through Reference-Free Clustering using Representatives,\u201d <em>2024 37th International Conference on VLSI Design <\/em>and <em>2024 23rd International Conference on Embedded Systems (VLSID)<\/em>, Kolkata, India, 2024, pp. 467-473.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><em><u>Niraj Prasad Bhatta<\/u> <\/em>and <strong>Fathi Amsaad<\/strong>, \u201cMachine Learning-Based Classification of Hardware Trojans Using Power Side-Channel Signals,\u201d <em>The 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS)<\/em>, Springfield, MA, USA, August 11-14, 2024.<\/li>\n<li><em><u>Mohammed Alkurdi<\/u><\/em>, <em><u>Ashutosh Ghimire<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, \u201dAdversarial Attack Resilient ML-Assisted Hardware TrojanDetection Technique,\u201d <em>the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2024)<\/em>, Knoxville, Tennessee, USA, July 1-3, 2024.<\/li>\n<li><em><u>Harshdeep Singh<\/u> <\/em>and <strong>Fathi Amsaad<\/strong>, \u201cEnhancing Supply Chain Security: Machine Learning for ManufacturerIdentification of SRAM PUFs,\u201d <em>the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2024)<\/em>, Knoxville, Tennessee, USA, July 1-3, 2024.<\/li>\n<li><em><u>Niraj Prasad Bhatta<\/u> <\/em>and <strong>Fathi Amsaad<\/strong>, \u201cAdvancing PUF Security: Machine Learning-Assisted ModelingAttacks,\u201d <em>the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2024)<\/em>, Knoxville, Tennessee, USA, July 1-3, 2024.<\/li>\n<li><em><u>Vishnu Vardhan Baligodugula<\/u> <\/em>and <strong> Amsaad<\/strong>, \u201dEnhancing the Performance of Unsupervised Machine Learning using Parallel Computing: A Comparative Analysis,\u201d <em>3rd International Conference on Computing and Machine Intelligence (ICMI)<\/em>, Mount Pleasant, Michigan, April 13-14, 2024.<\/li>\n<li><em><u>Tabassum Simra<\/u><\/em>, <em><u>Bharath Konatham<\/u><\/em>, <strong>Fathi Amsaad<\/strong>, Mohamed Ibrahem, and Noor Zaman Jhanjhi, \u201dEnhancing Anomaly Detection of IoT using Knowledge-Based and Federated Deep Learning,\u201d <em>3rd International Conference on Computing and Machine Intelligence (ICMI)<\/em>, Mount Pleasant, Michigan, April 13-14, 2024.<\/li>\n<li><em><u>Mithun Kumar PK<\/u><\/em>, <em><u>Al Amin Hossain<\/u><\/em>, <em><u>Sufian Al Majmaie<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, \u201dRouting Protocol Attack DetectionUsing Machine Learning Through Parallel Computing in Wireless Sensor Network,\u201d <em>3rd International Conference on Computing and Machine Intelligence (ICMI)<\/em>, Mount Pleasant, Michigan, April 13-14, 2024.<\/li>\n<li><em><u> V. Baligodugula<\/u><\/em>, <strong>F. Amsaad <\/strong>and N. Jhanjhi, \u201dAnalyzing the Parallel Computing Performance of UnsupervisedMachine Learning,\u201d <em>2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC)<\/em>, Tandojam, Pakistan, 2024, pp. 1-6, doi: 10.1109\/KHI-HTC60760.2024.10482277.<\/li>\n<li><em><u> M. T. Nowroz<\/u><\/em>, <strong>F. Amsaad <\/strong>and N. Jhanjhi, \u201dDielectric Characterization for Secure and Reliable High-FrequencyPrinted Circuit Board Applications,\u201d <em>2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC)<\/em>, Tandojam, Pakistan, 2024, pp. 1-5, doi:<span style=\"font-size: 1rem; letter-spacing: 0.02em;\">10.1109\/KHI-HTC60760.2024.10482244.<\/span><\/li>\n<\/ol>\n<ol start=\"11\">\n<li><em><u> P. Bhatta<\/u><\/em>, <em><u>S. A. Majmaie<\/u><\/em>, <strong>F. Amsaad<\/strong>, N. Jhanjhi and T. R. Soomro, \u201dSRAM PUFs: A Study of Aging Impact andPotential Mitigation,\u201d <em>2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC)<\/em>, Tandojam, Pakistan, 2024, pp. 1-5, doi:<span style=\"font-size: 1rem; letter-spacing: 0.02em;\">10.1109\/KHI-HTC60760.2024.10482239.<\/span><\/li>\n<\/ol>\n<ol start=\"12\">\n<li><em><u> Niveshitha<\/u><\/em>, <strong>F. Amsaad <\/strong>and N. Z. Jhanjhi, \u201dAir Quality Prediction in Smart Cities Using Cloud MachineLearning,\u201d <em>2023 Second International Conference on Smart Technologies for Smart Nation (SmartTechCon)<\/em>, Singapore, Singapore, 2023, pp. 1115-1119.<\/li>\n<li><em><u> R. Konatham<\/u><\/em>, T. <em><u>Simra, A. Ghimire<\/u><\/em>, <strong>F. Amsaad<\/strong>, M. I. Ibrahem and N. Z. Jhanjhi, \u201dML-assisted Security for Anomaly Detection in Industrial IoT (IIoT) Applications,\u201d <em>2023 Second International Conference on SmartTechnologies for Smart Nation (SmartTechCon)<\/em>, Singapore, Singapore, 2023, pp. 1120-1127.<\/li>\n<\/ol>\n<ol start=\"14\">\n<li><em><u>Harshdeep Singh<\/u><\/em>, <em><u>Vishnu Vardhan Baligodugula<\/u><\/em>, and Fathi Amsaad, \u201cShrew Distributed<\/li>\n<\/ol>\n<p>Denial-of-Service (DDoS) Attack in IoT Applications: A Survey,\u201d <em>Internet of Things. Advances in Information andCommunication Technology( IFIPIoT 2023)<\/em>, Denton, TX, USA, November 2\u20133, 2023.<\/p>\n<ol start=\"15\">\n<li><em><u>Ashutosh Ghimire<\/u><\/em>, <em><u>Vishnu Vardhan Baligodugula<\/u><\/em>, and <strong>Fathi Amsaad<\/strong>, \u201cPower Analysis Side-Channel Attacks on Sameand Cross-Device Settings: A Survey of Machine Learning Techniques,\u201d <em>Internet of Things. Advances in Informationand Communication Technology (IFIPIoT 2023)<\/em>,2-3 NOVEMBER 2023 DALLAS-FORT WORTH METROPLEX, TEXAS, USA.<\/li>\n<li><em><u>Niraj Prasad Bhatta<\/u><\/em>, <em><u>Ashutosh Ghimire<\/u><\/em>, <em><u>Al Amin Hossain<\/u><\/em>, and Fathi Amsaad, \u201cComprehensive Survey of MachineLearning Techniques for Detecting and Preventing Network Layer DoS Attacks,\u201d <em>Internet of Things. Advances inInformation and Communication Technology (IFIPIoT 2023)<\/em>,2-3 NOVEMBER 2023 DALLAS-FORT WORTH METROPLEX, TEXAS, USA.<\/li>\n<li><em><u> P. Bhatta<\/u><\/em>, <strong>F. Amsaad<\/strong>, <em><u>H. Singh, A<\/u><\/em>. Sherif and K. Hopkinson, \u201dEnhancing Hardware Security: An Analysis of SRAM-PUFs,\u201d <em>NAECON 2023 &#8211; IEEE National Aerospace and Electronics Conference<\/em>, Dayton, OH, USA, 2023, pp. 174-180.<\/li>\n<li><em><u> Ghimire<\/u><\/em>, <strong>F. Amsaad<\/strong>, T. Hossain, T. Hoque and A. Sherif, \u201dFPGA Hardware Trojan Detection: Golden-Free MachineLearning Approach,\u201d <em>NAECON 2023 &#8211; IEEE National Aerospace and Electronics Conference<\/em>, Dayton, OH, USA, 2023, pp. 181-186.<\/li>\n<li><em><u>Harshdeep Singh<\/u><\/em>, <em><u> P. Bhatta<\/u><\/em>, <em><u>K. M. T. Jawad<\/u><\/em>, <em><u>H. Singh<\/u><\/em>, <strong>F. Amsaad <\/strong>and K. Hopkinson, \u201dML-AssistedSecurity for the Detection of DDoS Attacks in Connected IIoT Environment:<\/li>\n<\/ol>\n<p>Implementation and Comparative Analysis,\u201d <em>NAECON 2023 &#8211; IEEE National Aerospace and Electronics Conference<\/em>, Dayton, OH, USA, 2023, pp. 59-66.<\/p>\n<ol start=\"20\">\n<li><em><u>Harshdeep Singh<\/u><\/em>, <em><u> P. Bhatta<\/u><\/em>, <em><u>K. M. Tawsik Jawad<\/u><\/em>, <em><u>A. Ghimire<\/u><\/em>, M. T. Rahman and <strong>F. Amsaad<\/strong>, \u201dEvaluating theRobustness of SRAM Physical Unclonable Functions: Empirical Investigations,\u201d <em>2023 IEEE Physical Assurance andInspection of Electronics (PAINE)<\/em>, Huntsville, AL, USA, 2023, pp. 1-7.<\/li>\n<li><em><u> P. Bhatta<\/u><\/em>, <em><u>H. Singh<\/u><\/em>, <em><u>A. Ghimire<\/u><\/em>, M. T. Rahman and <strong>F. Amsaad<\/strong>, \u201dAging of SRAM PUFs: Mitigation andAdvancements Through Machine Learning Techniques,\u201d <em>2023 IEEE Physical Assurance and Inspection of Electronics (PAINE)<\/em>, Huntsville, AL, USA, 2023, pp. 1-6.<\/li>\n<li><em><u> Ghimire<\/u><\/em>, <em><u>A. A. Hossain<\/u><\/em>, <em><u>N. P. Bhatta<\/u><\/em>, and <strong>F. Amsaad<\/strong>, \u201dIdentification and Localization of Quantum Electromagnetic Fields of Hardware Trojan Attacks Using QDM-Based Unsupervised Deep Learning,\u201d <em>2023 IEEE Physical Assuranceand Inspection of Electronics (PAINE)<\/em>, Huntsville, AL, USA, 2023, pp. 1-6.<\/li>\n<li><em><u> Ghimire<\/u><\/em>, A. N. Asiri, <em><u>Brian Hildebrand<\/u><\/em>, and <strong>F. Amsaad<\/strong>, \u201dImplementation of Secure and<\/li>\n<\/ol>\n<p>Privacy-aware AI Hardware using Distributed Federated Learning,\u201d <em>2023 IEEE 16th Dallas Circuits and Systems Conference (DCAS)<\/em>, Denton, TX, USA, 2023, pp. 1-6.<\/p>\n<ol start=\"24\">\n<li><strong> Amsaad<\/strong>, A. Razaque, M. Baza, S. Kose, S. Bhatia and G. Srivastava, \u201dAn Efficient and Reliable Lightweight PUF forIoT-based Applications,\u201d <em>2021 IEEE International Conference on Communications Workshops (ICC Workshops)<\/em>, Montreal, QC, Canada, 2021, pp. 1-6.<\/li>\n<li><strong> Amsaad <\/strong>and S. K\u00a8ose, \u201dA Lightweight Hardware-based Authentication for Secure Smart Grid Energy Storage Units,\u201d<em>2021 IEEE 7th World Forum on Internet of Things (WF-IoT)<\/em>, New Orleans, LA, USA, 2021, pp. 443-448.<\/li>\n<\/ol>\n<ol start=\"26\">\n<li><em><u> Halder<\/u><\/em>, <strong>Fathi Amsaad<\/strong>, N. Fourty and <em><u>B. Hildebrand<\/u><\/em>, \u201dA Low-Power IoT-enabled Smart Monitoring System for Efficient Product Delivery,\u201d <em>2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)<\/em>, Lansing, MI, USA, 2021, pp. 692-695.<\/li>\n<li><strong> Amsaad <\/strong>and S. K\u00a8ose, \u201dA Trusted Authentication Scheme for IoT-based Smart Grid Applications,\u201d<em style=\"font-size: 1rem; letter-spacing: 0.02em;\">2020 IEEE 6th World Forum on Internet of Things (WF-IoT)<\/em><span style=\"font-size: 1rem; letter-spacing: 0.02em;\">, New Orleans, LA, USA, 2020.<\/span><\/li>\n<\/ol>\n<ol start=\"28\">\n<li><strong> Amsaad<\/strong>, A. Sherif, <em><u>D. Halder<\/u><\/em>, and M. Mahmoud, \u201cAn Efficient and privacy aware hardware-based authenticationscheme for AMI network,\u201d <em>Proc. of IEEE SoutheastCon\u201920<\/em>, Raleigh, NC, 2020.<\/li>\n<li><strong> Amsaad<\/strong>, A. Sherif, A. Dawoud, M. Niamat and S. Kose, \u201dA Novel FPGA-based LFSR PUF Design for IoT and Smart Applications,\u201d <em>NAECON 2018 &#8211; IEEE National Aerospace and Electronics Conference<\/em>, Dayton, OH, USA, 2018.<\/li>\n<li><em><u> Shafee<\/u><\/em>, M. Nabil, M. Mahmoud, W. Alasmary and <strong>F. Amsaad<\/strong>, \u201dDetection of Denial of Charge (DoC) Attacks inSmart Grid Using Convolutional Neural Networks,\u201d <em>2021 International Symposium on Networks, Computers and Communications (ISNCC)<\/em>, Dubai, United Arab Emirates, 2021.<\/li>\n<li>Baza, R. Amer, <strong>F. Amsaad<\/strong>, M. Mahmoud and W. Alasmary, \u201dEfficient Privacy-preserving Charging Coordination with Linkability-resistance in the Smart Grid,\u201d <em>2021 IEEE Globecom Workshops (GC Wkshps)<\/em>, Madrid, Spain, 2021, pp. 1-5.<\/li>\n<li>Ibrahim Yilmaz, Mohamed Baza, Ramy Amer, Amar Rasheed, <strong>Fathi Amsaad<\/strong>, and Rasha Morsi, \u201cOn the Assessment of Robustness of Telemedicine Applications against Adversarial Machine Learning Attacks,\u201d <em>2021 InternationalConference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Advances and Trends in Artificial Intelligence (IEA\/AIE 2021)<\/em>, Kuala Lumpur,<\/li>\n<li>Abdul Razaque, <strong>Fathi Amsaad<\/strong>, <em><u>Dipal Halder<\/u><\/em>, Mohamed Baza, Abobakr Aboshgif, and Sajal Bhatia, \u201cAnalysis of sentimental behaviour over social data using machine learning algorithms,\u201d <em>2021 International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Advances and Trends in ArtificialIntelligence (IEA\/AIE 2021)<\/em>, Kuala Lumpur,<\/li>\n<li>Abdul Razaque, <strong>Fathi Amsaad<\/strong>, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf Ganda, Majdi Rawashdeh, andAmer AlRahayfeh, \u201dEfficient Context-aware File System Approach,\u201d <em>2020 Seventh International Conference onSoftware Defined Systems (SDS)<\/em>, Paris, France,<\/li>\n<li>Abdul Razaque, <strong>Fathi Amsaad<\/strong>, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahameed, Ayman Al-Dmour,Meer Jaro Khan, \u201dSuccesses and Failures in Exploring Biometric Algorithms in NIST Open-Source Software and Data,\u201d<em>2020 Seventh International Conference on Software Defined Systems (SDS)<\/em>, Paris, France, 2020, pp. 231-234.<\/li>\n<li>Razaque, M. B. H. Frej, D. Sabyrov, A. Shaikhyn, <strong>F. Amsaad <\/strong>and A. Oun, \u201dDetection of Phishing Websites usingMachine Learning,\u201d <em>2020 IEEE Cloud Summit<\/em>, Harrisburg, PA, USA, 2020, pp. 103-107.<\/li>\n<li>Razaque, <strong>F. Amsaad<\/strong>, M. J. Khan, A. Saule Toksanovna, A. Oun and M. Almiani, \u201dPrivacy Preserving MediumAccess Control Protocol for wireless Body Area Sensor Networks,\u201d <em>2019 IEEE National Aerospace and ElectronicsConference (NAECON)<\/em>, Dayton, OH, USA, 2019.<\/li>\n<li>Razaque, <strong>F. Amsaad<\/strong>, C. Mengjie Cherry, L. Jiahui Linda and A. Oun, \u201dSmart Phone as Toolbox for HeightMeasurement,\u201d <em>2019 IEEE National Aerospace and Electronics Conference (NAECON)<\/em>, Dayton, OH, USA, 2019.<\/li>\n<\/ol>\n<ol start=\"39\">\n<li>Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, <strong>Fathi Amsaad<\/strong>, Muder Almiani, Raouf Ganda, and Ahmed Oun, \u201dTwo Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms forSecure Data Communication,\u201d <em>2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS)<\/em>, Granada, Spain, 2019, pp.<span style=\"font-size: 1rem; letter-spacing: 0.02em;\">405-411.<\/span><\/li>\n<\/ol>\n<ol start=\"40\">\n<li>Abdul Razaque, A. Kanapina, M. Sailaubek, D. Tsoy, Z. Turganov, Muder Almiani, <strong>Fathi Amsaad<\/strong>, and MohammadAdnan Almahamed, \u201dPair Data Division Algorithm for Handling Data Classification,\u201d <em>2019 Sixth InternationalConference on Social Networks Analysis, Management and Security (SNAMS)<\/em>, Granada, Spain, 2019, pp. 316-320.<\/li>\n<li>Tastan, A. Razaque, M. Ben Haj Frej, A. Saule Toksanovna, R. M. Ganda and <strong>F. Amsaad <\/strong>, \u201dBurglary DetectionFramework for House Crime Control,\u201d <em>2019 19th International Conference on Computational Science and Its Applications (ICCSA)<\/em>, St. Petersburg, Russia, 2019, pp. 152-157.<\/li>\n<li>Razaque, <strong>F. Amsaad<\/strong>, L. Jiazhi, G. Huayue and A. Hassan, \u201dIncentive mechanisms for crowdsensing,\u201d <em>2018IEEE Long Island Systems, Applications and Technology Conference (LISAT)<\/em>, Farmingdale, NY, USA, 2018, pp. 1-6.<\/li>\n<li>Razaque, <strong>F. Amsaad<\/strong>, M. A. Khaskheli, M. J. Khan, A. Hassan and A. M. Ilyas, \u201dSecure and energy efficient mobilepayment protocol,\u201d <em>2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)<\/em>, Farmingdale, NY, USA, 2018, pp. 1-6.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Published Journal Papers<\/p>\n","protected":false},"author":201,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-486","page","type-page","status-publish","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages\/486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/users\/201"}],"replies":[{"embeddable":true,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=486"}],"version-history":[{"count":5,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages\/486\/revisions"}],"predecessor-version":[{"id":493,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages\/486\/revisions\/493"}],"wp:attachment":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}