Follow

Submissions from 2020

Link

Towards an Automatic Identification of Microservices from Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki

Link

Suitability of Blockchain for Collaborative Intrusion Detection Systems, Nahom Aron Dawit, Sujith Samuel Mathew, and Kadhim Hayawi

Link

CLNet: A Compact Latent Network for Fast Adjusting Siamese Trackers, Xingping Dong, Jianbing Shen, Ling Shao, and Fatih Porikli

Link

Building Trusted Startup Teams from LinkedIn Attributes: A Higher Order Probabilistic Analysis, Georgios Drakopoulos, Eleana Kafeza, Phivos Mylonas, and Haseena Al Katheeri

Link

One Dimensional Cross-Correlation Methods for Deterministic and Stochastic Graph Signals with A Twitter Application in Julia, Georgios Drakopoulos and Eleanna Kafeza

Link

Learning to Learn with Variational Information Bottleneck for Domain Generalization, Yingjun Du, Jun Xu, Huan Xiong, Qiang Qiu, Xiantong Zhen, Cees G.M. Snoek, and Ling Shao

Link

MetaNorm: Learning to Normalize Few-Shot Batches Across Domains, Yingjun Du, Xiantong Zhen, Ling Shao, and Cees G. M. Snoek

Link

Evaluating Citizens' Sentiments in Smart Cities: A Deep Learning Approach, Abdallah Elabora, Manar Alkhatib, Sujith Samuel Mathew, and May El Barachi

Link

PraNet: Parallel Reverse Attention Network for Polyp Segmentation, Deng Ping Fan, Ge Peng Ji, Tao Zhou, Geng Chen, Huazhu Fu, Jianbing Shen, and Ling Shao

Link

Exploiting Deep Neural Networks for Intention Mining, Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, and Muhammad Zubair Asghar

Link

Layer-Wise Conditioning Analysis in Exploring the Learning Dynamics of DNNs, Lei Huang, Jie Qin, Li Liu, Fan Zhu, and Ling Shao

Link

VAE-GAN based zero-shot outlier detection, Bekkouch Imad Ibrahim, Dragos Constantin Nicolae, Adil Khan, Syed Imran Ali, and Asad Khattak

Link

Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models, Salman Jan, Shahrulniza Musa, Toqeer Ali, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, and Babar Shah

Link

A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach, Sanaa Kaddoura, Omar Alfandi, and Nadia Dahmani

Link

Promoting Teaching Practices in IT Higher Education, Sanaa Kaddoura and Rima Grati

Link

Legal smart contracts in ethereum block chain: Linking the dots, Eleanna Kafeza, Syed Juned Ali, Irene Kafeza, and Haseena Alkatheeri

PDF

A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders, Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri

Link

AI and machine learning: A mixed blessing for cybersecurity, Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, and Thar Baker

Link

Analysis of the Importance of Systolic Blood Pressure Versus Diastolic Blood Pressure in Diagnosing Hypertension: MRA Study., Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Adel Elmaghraby, and Ayman El-Baz

Link

Dynamic framework to mining Internet of Things for multimedia services, Yaser Khamayseh, Wail Mardini, J. William Atwood, and Monther Aldwairi

Link

Towards a Novel Intrusion Detection Architecture using Artificial Intelligence, Salam Khanji and Asad Khattak

Link

Interpretable and Generalizable Person Re-identification with Query-Adaptive Convolution and Temporal Lifting, Shengcai Liao and Ling Shao

Interpretable Neural Network Decoupling, Yuchao Li, Rongrong Ji, Shaohui Lin, Baochang Zhang, Chenqian Yan, Yongjian Wu, Feiyue Huang, and Ling Shao

Link

Internet of Things, Zakaria Maamar

Link

Thingsourcing to Enable IoT Collaboration, Zakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, and Said Elnaffar

Link

Process-of-Things: Weaving film industry’s practices into the Internet-of-Things, Zakaria Maamar, Noura Faci, Ejub Kajan, Safet Purković, and Emir Ugljanin

Link

Structure Preserving Stain Normalization of Histopathology Images Using Self Supervised Semantic Guidance, Dwarikanath Mahapatra, Behzad Bozorgtabar, Jean Philippe Thiran, and Ling Shao

Link

Pink Ocean Strategy: Democratizing Business Knowledge for Social Growth and Innovation, Evangelos Markopoulos, Maria Barbara Ramonda, Lisa Marie Carolin Winter, Haseena Al Katheeri, and Hannu Vanharanta

Link

Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data, Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, and Muhsin Cheratta

Link

On the need for cultural sensitivity in digital wellbeing tools and messages: A UK-China comparison, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali

Link

Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali

Link

WorldCIST (2) - On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison., John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali

Link

Digital Forensic Acquisition and Analysis of Discord Applications, Michal Motylinski, Aine MacDermott, Farkhund Iqbal, Mohammed Hussain, and Saiqa Aleem

Link

ECCV (22) - Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G. M. Snoek, and Ling Shao

PDF

Evaluating IT Governance Structure Implementation in the Gulf Cooperation Council Region, Mathew Nicho and Suadad Muamaar

Link

A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks, Safa Otoum, Burak Kantarci, and Hussein T. Mouftah

Link

Blockchain-Supported Federated Learning for Trustworthy Vehicular Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah

PDF

Contextual healing: Privacy through interpretation management, Fatma Outay and Rula Sayaf

Link

PhishOut: PhishOut: Effective Phishing Detection Using Selected Features, Suhail Paliath, Mohammad Abu Qbeitah, and Monther Aldwairi

Link

On the use of elitism to improve convergence of the chemical reaction optimization algorithm in discrete optimization problems, Sinan Salman

Link

Network design using chemical reaction optimization and markov-chain traffic assignment, Sinan Salman and Suzan Alaswad

Link

Vehicles' emissions consideration in transportation network design using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad

Link

A Comprehensive Framework for Accurate Classification of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

Access Permissions for Apple Watch Applications: A Study on Users' Perceptions, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, and Ali Arsalan

Link

Invertible Zero-Shot Recognition Flows, Yuming Shen, Jie Qin, Lei Huang, Li Liu, Fan Zhu, and Ling Shao

Link

A predictive model of users’ behavior and values of smart energy meters using PLS-SEM, Ahmed Shuhaiber

Link

Trust in smart energy meters: The role of perceived values, Ahmed Shuhaiber

Link

Precise Cerebrovascular Segmentation, F. Taher, A. Soliman, H. Kandil, A. Mahmoud, A. Shalaby, G. Gimel'farb, and A. El-Baz

Link

Improving the impact of power efficiency in mobile cloud applications using cloudlet model, Lo'ai Tawalbeh, Mohammad A. Tawalbeh, and Monther Aldwairi

Link

Building a security framework for smart cities: A case study from UAE, Abdallah Tubaishat and Mariam Al Jouhi

Link

Optimizing the Efficiency of Machine Learning Techniques, Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, and Asad Masood Khattak

Link

Automatic C-Plane Detection in Pelvic Floor Transperineal Volumetric Ultrasound, Helena Williams, Laura Cattani, Mohammad Yaqub, Carole Sudre, Tom Vercauteren, Jan Deprest, and Jan D’hooge

Link

Region Graph Embedding Network for Zero-Shot Learning, Guo Sen Xie, Li Liu, Fan Zhu, Fang Zhao, Zheng Zhang, Yazhou Yao, Jie Qin, and Ling Shao

Link

Count- and Similarity-Aware R-CNN for Pedestrian Detection, Jin Xie, Hisham Cholakkal, Rao Muhammad Anwer, Fahad Shahbaz Khan, Yanwei Pang, Ling Shao, and Mubarak Shah

Link

ICML - On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao

Link

ECCV (17) - Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-Identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo

Link

Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo

Link

Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain

Link

Learning Enriched Features for Real Image Restoration and Enhancement, Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming Hsuan Yang, and Ling Shao

Link

Unsupervised Domain Adaptation with Noise Resistible Mutual-Training for Person Re-identification, Fang Zhao, Shengcai Liao, Guo Sen Xie, Jian Zhao, Kaihao Zhang, and Ling Shao

Link

M2Net : Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients, Tao Zhou, Huazhu Fu, Yu Zhang, Changqing Zhang, Xiankai Lu, Jianbing Shen, and Ling Shao

Submissions from 2019

Link

Delay and energy based message delivery in delay tolerant networks, Ali Abbas, Babar Shah, Muhammad Habib, Francis Chow, Raza Hasan, and Ki Il Kim

Link

A Novel Deep Learning Approach for Left Ventricle Automatic Segmentation in Cardiac Cine MR, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz

Link

Automatic segmentation and functional assessment of the left ventricle using u-net fully convolutional network, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz

Link

Data Mining in Health Care Sector: Literature Notes, Ahed Abugabah, Ahmad Al Smadi, and Alaa Abuqabbeh

Link

Towards an end-user layer for data integrity, Lu'ay Abu-Rayyan, Hakim Hacid, and Andrew Leoncé

Link

The effect of demand variability on supply chain performance, Suzan Alaswad, Sinan Salman, Arwa Alhashmi, Hawra Almarzooqi, and Meera Alhammadi

Link

Blockchain in Supply Chain Trading, Nedaa Baker Al Barghuthi, Hussam Juma Mohamed, and Huwida E. Said

Link

State of Art of the Effectiveness in Adopting Blockchain Technology-UAE Survey Study, Nedaa Baker Al Barghuthi, Cornelius Ncube, and Huwida Said

Link

Readiness, Safety, and Privacy on Adopting Autonomous Vehicle Technology: UAE Case Study, Nedaa Baker Al Barghuthi and Huwida Said

Link

Online peer support groups to combat digital addiction: User acceptance and rejection factors, Manal Aldhayan, Sainabou Cham, Theodoros Kostoulas, Mohamed Basel Almourad, and Raian Ali

Link

n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems, Monther Aldwairi and Duaa Alansari

Link

Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak

Link

Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak

PDF

Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith

Link

A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb

Link

Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal

Link

Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi

Link

Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien

Link

Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh

Link

A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh

Link

Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler

Link

Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said

Link

A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair

Link

Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira

Link

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi

Link

A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal

PDF

Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi

Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh

Link

Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov

Link

Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi

Link

Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi

Link

Testbed of QoS Ad-Hoc network designed for cooperative multi-drone tasks, Ouns Bouachir, Moayad Aloqaily, Fabien Garcia, Nicolas Larrieu, and Thierry Gayraud

Link

Digital addiction: Negative life experiences and potential for technology-assisted solutions, Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, and Raian Ali

Link

An Active Noise Correction Graph Embedding Method Based on Active Learning for Graph Noisy Data, Zhiyuan Cui, Donghai Guan, Cong Li, Weiwei Guan, and Asad Masood Khattak

Link

Dynamic Neural Network for Business and Market Analysis, Javier de Arquer Rilo, Abir Hussain, May Al-Taei, Thar Baker, and Dhiya Al-Jumeily

Link

Deep Learning Based Method for Computer Aided Diagnosis of Diabetic Retinopathy, Omar Dekhil, Ahmed Naglah, Mohamed Shaban, Mohammed Ghazal, Fatma Taher, and Ayman Elbaz

Link

A Novel Fully Automated CAD System for Left Ventricle Volume Estimation, Omar Dekhil, Fatma Taher, Fahmi Khalifa, Garth Beache, Adel Elmaghraby, and Ayman El-Baz

Link

Proof systems in blockchains: A survey, Georgios Drakopoulos, Eleanna Kafeza, and Haseena Al Katheeri

PDF

In Situ Mutation for Active Things in the IoT Context, Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami