Showing 1 - 18 results of 18 for search 'Abdullah Al-Dhelaan', query time: 0.05s
Refine Results
-
1
The efficiency of buffer by Ahmed Aldammas, Adel Soudani, Abdullah Al-Dhelaan
Published 2016-04-01
Article -
2
-
3
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks by Ohood Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan
Published 2013-05-01
Article -
4
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks by Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan
Published 2013-07-01
Article -
5
-
6
Anomaly detection over differential preserved privacy in online social networks. by Randa Aljably, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan
Published 2019-01-01
Article -
7
-
8
Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service by Yuan Tian, Biao Song, Tinghuai Ma, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan
Published 2021-01-01
Article -
9
Blockchain-Enabled Access Management System for Edge Computing by Yong Zhu, Chao Huang, Zhihui Hu, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan
Published 2021-04-01
Article -
10
-
11
-
12
Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm by Tinghuai Ma, Jingjing Qu, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan
Published 2018-01-01
Article -
13
A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks by TingHuai Ma, Siyang Yu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan
Published 2018-01-01
Article -
14
Weighted enclosing subgraph-based link prediction for complex network by Weiwei Yuan, Yun Han, Donghai Guan, Guangjie Han, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan
Published 2022-07-01
Article -
15
<inline-formula> <tex-math notation="LaTeX">$\mathcal{K}$ </tex-math></inline-formula>-Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks by Meili Tang, Qin Liu, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan
Published 2019-01-01
Article -
16
Improving Label Noise Filtering by Exploiting Unlabeled Data by Donghai Guan, Hongqiang Wei, Weiwei Yuan, Guangjie Han, Yuan Tian, Mohammed Al-Dhelaan, Abdullah Al-Dhelaan
Published 2018-01-01
Article -
17
Smartphone Architecture for Edge-Centric IoT Analytics by Bockarie Daniel Marah, Zilong Jing, Tinghuai Ma, Raeed Alsabri, Raphael Anaadumba, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan
Published 2020-02-01
Article -
18
A stochastic location privacy protection scheme for edge computing by Yuan Tian, Biao Song, Mznah Al Rodhaan, Chen Rong Huang, Mohammed A. Al-Dhelaan, Abdullah Al-Dhelaan, Najla Al-Nabhan
Published 2020-03-01
Article