Nadra Guizani

ORCID: 0000-0001-5332-2685
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Underwater Vehicles and Communication Systems
  • Opportunistic and Delay-Tolerant Networks
  • UAV Applications and Optimization
  • Cryptography and Data Security
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • Anomaly Detection Techniques and Applications
  • Energy Harvesting in Wireless Networks
  • Internet Traffic Analysis and Secure E-voting
  • Cooperative Communication and Network Coding
  • Software-Defined Networks and 5G
  • IoT Networks and Protocols
  • Advanced MIMO Systems Optimization
  • Advanced Authentication Protocols Security
  • Security and Verification in Computing
  • Indoor and Outdoor Localization Technologies
  • User Authentication and Security Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Autonomous Vehicle Technology and Safety

The University of Texas at Arlington
2021-2024

Washington State University
2019-2022

University of Idaho
2020-2021

Purdue University West Lafayette
2013-2020

Shaanxi Normal University
2020

Gonzaga University
2019-2020

State of The Art
2020

ORCID
2019

Kyung Hee University
2019

Intelligence is one of the most important aspects in development our future communities. Ranging from smart home to building city, all these infrastructures must be supported by intelligent power supply. Smart grid proposed solve challenges electricity In grid, order realize optimal scheduling, an SM installed at each collect near-real-time consumption data, which can used utilities offer better services. However, data may disclose a user's private information. An adversary track application...

10.1109/mcom.2018.1700401 article EN IEEE Communications Magazine 2018-07-01

Tactile edge technology that focuses on 5G or beyond reveals an exciting approach to control infectious diseases such as COVID-19 internationally. The of epidemics can be managed effectively by exploiting computation through the wireless connectivity network. implementation a hierarchical computing system provides many advantages, low latency, scalability, and protection application training model data, enabling evaluated dependable local server. In addition, deep learning (DL) algorithms...

10.1109/mnet.011.2000458 article EN IEEE Network 2020-07-01

The Internet of Things is a novel paradigm with access to wireless communication systems and artificial intelligence technologies, which considered be applicable variety promising fields applications. Meanwhile, the development fifth-generation cellular network technologies creates possibility deploy enormous sensors in framework IoT process massive data, challenging communications data mining. In this article, we propose paradigm, 5G Intelligent (5G I-IoT), big intelligently optimize...

10.1109/mcom.2018.1701310 article EN IEEE Communications Magazine 2018-10-01

An unprecedented proliferation of autonomous driving technologies has been observed in recent years, resulting the emergence reliable and safe transportation services. In foreseeable future, millions cars will communicate with each other become prevalent smart cities. Thus, scalable, robust, secure, fault-tolerant, interoperable are required to support such a plethora cars. this article, we investigate, highlight, report premier research advances made by devising taxonomy. A few...

10.1109/mnet.2019.1900120 article EN IEEE Network 2019-08-22

Edge computing provides high-class intelligent services and capabilities at the edge of networks. The aim is to ease backhaul impacts offer an improved user experience. However, artificial intelligence exacerbates security cloud environment due dissociation data, access control, service stages. In order prevent users from carrying out lateral movement attacks in edge-cloud environment, this paper we propose a real-time detection method, named CloudSEC, based on evidence reasoning network for...

10.1109/tii.2019.2907754 article EN IEEE Transactions on Industrial Informatics 2019-03-27

In recent years, unprecedented work has been done in the area of smart cities. The purpose developing cities is to enhance quality life factors for people dwelling within them. To achieve that purpose, technologies such as IoT and cloud computing have utilized. Blockchain technology also among promising can offer countless valuable services its end users. It a immutable programmable digital register recording virtual assets having some value was primarily developed currencies like Bitcoin....

10.1109/mnet.001.1900178 article EN IEEE Network 2020-01-01

With the advent of medical IoT devices, types and volumes images have significantly increased. Retrieving is great importance to facilitate disease diagnosis improve treatment efficiency. However, it may raise privacy concerns from individuals, since contain patients' sensitive private information. Existing studies on retrieval data either fail protect information or are limited a single image provider. In this article, we propose blockchain-based system for with protection. We first...

10.1109/mnet.001.1800503 article EN IEEE Network 2019-09-01

The requirement of high data rates, low latency, efficient use spectrum, and coexistence different network technologies are major considerations in Internet Things (IoT)-based fifth generation (5G) networks. To achieve the above requirements, incorporation artificial intelligence (AI) is required to make decisions based on massive generated by large number IoT devices. AI methods analyze extract patterns sense prescribe action end In this work, we first give an overview, discussing...

10.1109/mcom.2018.1800036 article EN IEEE Communications Magazine 2018-10-01

The revolutionary advances in machine learning and data mining techniques have contributed greatly to the rapid developments of maritime Internet Things (IoT). In IoT, spatio-temporal vessel trajectories, collected from hybrid satellite-terrestrial automatic identification system (AIS) base stations, are considerable importance for promoting traffic situation awareness services, etc. To guarantee safety efficiency, it is essential robustly accurately predict AIS-based trajectories (i.e.,...

10.1109/tii.2022.3165886 article EN IEEE Transactions on Industrial Informatics 2022-04-08

Recently the topic of how to effectively offload cellular traffic onto device-to-device sharing among users in proximity has been gaining more and attention from global researchers engineers. Users utilize wireless short-range communications for contents locally, due not only rapid experience free cost, but also high accuracy on deliveries interesting popular contents, as well strong social impact friends. Nevertheless, existing related studies are mostly confined small-scale datasets,...

10.1109/mwc.2018.1700215 article EN IEEE Wireless Communications 2018-02-01

According to a report by the World Health Organization, diseases caused an unhealthy lifestyle represent leading cause of death all over world. Therefore, it is crucial monitor and avoid users' behaviors. Existing health monitoring approaches still face many challenges limited intelligence due insufficient healthcare data. this article proposes smart personal advisor (SPHA) for comprehensive intelligent guidance. The SPHA monitors both physiological psychological states user. SPHAScore model...

10.1109/mcom.2018.1700274 article EN IEEE Communications Magazine 2018-03-01

The rapid improvement in the global connectivity standards has escalated level of trade taking place among different parties. Advanced communication are allowing all types commodities and services. Furthermore, goods services developed a particular region transcending boundaries to enter into foreign markets. Supply chains play an essential role these goods. To be able realize connected world with no boundary restrictions terms services, it is imperative keep associated supply transparent,...

10.1109/jiot.2020.3025775 article EN IEEE Internet of Things Journal 2020-09-22

Internet of Things (IoT) enables modern improvements in smart sensors, RFID, technologies, and communication protocols. Sensor nodes are treated as devices widely used to gather forward sensed information. However, besides intrinsic constraints on sensor nodes, they vulnerable a variety security threats. This paper presents an energy-aware secure multi-hop routing (ESMR) protocol by using secret sharing scheme increase the performance energy efficiency with data against malicious actions....

10.1109/access.2019.2922971 article EN cc-by-nc-nd IEEE Access 2019-01-01

The rapid proliferation of Internet-of-Things (IoT) devices has brought great challenges data management, i.e., storing, retrieving and manipulating a large volume IoT data. Conventional systems rely on centralized architectures to manage data, hence suffering from limited scalability, lack transparency, single point failure issues. As such, we employ blockchain as distributed ledger support the decentralized approach management in systems, where are stored deployed for further utilization,...

10.1109/mnet.001.1900095 article EN IEEE Network 2020-01-01

To meet the demands of vehicular networks, such as high throughput, mobility, low latency, heterogeneity, and scalability, SDN has been applied for raising user experience through providing high-performance communications between network nodes, reconstructing structure, optimizing networking coverage, system security, communication so on. However, existing applications in mainly focus on data vehicles other nodes or devices, while controller area is still limited to some particular...

10.1109/mcom.2017.1601185 article EN IEEE Communications Magazine 2017-08-01

Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount financial transactions. Nevertheless, achieving privacy blockchain-based remains challenging blockchain by default a public ledger. For instance, Bitcoin provides builtin pseudonymity rather than true anonymity, which can be compromised analyzing Several solutions have been proposed enhance of Bitcoin. Unfortunately, full anonymity always desirable, because malicious are...

10.1109/mnet.2019.1800271 article EN IEEE Network 2019-02-15

B5G-based tactile edge learning shows promise as a solution to handle infectious diseases such COVID-19 at global level. By leveraging computing with the 5G RAN, management of epidemic can be conducted efficiently. Deploying hierarchical architecture offers several benefits scalability, low latency, and privacy for data training model, which enables analysis by local trusted server. However, existing deep (DL) algorithms suffer from two crucial drawbacks: first, requires large dataset on...

10.1109/mnet.011.2000353 article EN IEEE Network 2020-07-01

Considerable development in software-based configurable hardware has paved the way for a new networking paradigm called software-defined vehicular networks (SDVNs). The distinctive features of SDN, such as its flexibility and programmability, can help fulfill performance management requirements VANETs. Although several studies exist on VANET tutorial SDVNs is still lacking. In this article, we initially investigate recent premier research advances SDVN paradigm. Then categorize classify...

10.1109/mcom.2017.1601183 article EN IEEE Communications Magazine 2017-01-01

Trustworthy transmission is a beneficial step toward the success of new era telecommunication technologies and online social networks (OSNs). Many sensitive applications can benefit from OSNs, e.g., eHealth medical services. However, OSNs have always been prey to Sybil attacks where numerous fake nodes are being generated propagated in mimic like real for purpose achieving malicious goals. Thus, security reasons sensitivity data used applications, such be detected deactivated immediately....

10.1109/jiot.2020.3027440 article EN IEEE Internet of Things Journal 2020-09-29

Fog computing has enabled the extension of cloud functions to network edge by assisting and users in terms communication, computation, storage with a widely spread deployment devices or fog nodes, as they become more powerful capacities functionalities. Smart grid is becoming next-generation power will automate reliable electricity distribution for millions customers. However, data transmitted smart communications reached terabyte level mishandling meter readings may lead customers' privacy...

10.1109/mcom.2019.1700859 article EN IEEE Communications Magazine 2019-04-25

Ethereum started the blockchain-based smart contract technology that due to its scalability more and decentralized applications are now based on. On downside this has led exposure of security issues challenges, which gained widespread attention in terms research field vulnerabilities both academia industry. This article presents a survey contract's various corresponding defense mechanisms have been applied combat them. In particular, we focus on random number vulnerability Fomo3d-like game...

10.1109/mnet.001.1900656 article EN IEEE Network 2020-07-17

Traffic classification is a technology for classifying and identifying sensitive information from cluttered traffic. With the increasing use of encryption other evasion technologies, traditional content- based network traffic becomes impossible, increasingly related to security privacy. Many studies have been conducted investigate in various scenarios. A major challenge existing schemes extending broader space. In words, most work not universal can only show great performance on specific...

10.1109/mnet.011.1900366 article EN IEEE Network 2020-07-01

With the emergence of next-generation fiber materials and development sensors wearable technologies, new breakthroughs also emerge in field fabrics. By combining fabrics with sensors, artificial intelligence other intelligent create an intelligent, flexible adaptive performance, thus meeting people's needs better becoming more acceptable to users than traditional Nevertheless, present have some shortcomings, such as insufficient interactive ability, narrow scope applications, poor ability...

10.1109/mnet.011.1900570 article EN IEEE Network 2020-04-30

Applications of Internet Things underwater wireless sensor networks, such as imaging life, environmental monitoring, and supervising geological processes on the ocean floor, demand a prolonged network lifetime. However, these networks face many challenges, high path loss, limited available bandwidth, battery power, attenuation. For longer lifetime, both balanced efficient energy consumption are equally important. In this paper, we propose new routing protocol, called adaptive (BEAR), to...

10.1109/access.2017.2706741 article EN cc-by-nc-nd IEEE Access 2017-01-01

Fog computing is a new paradigm of distributed that extends the cloud's capability to edge network. It can provide better quality service, and particularly suitable for IoT applications, which generally have stringent requirements on latency reliability. In this article, we consider flight security safety UAVs, act as fog nodes in an airborne system. particular, propose method detect GPS spoofing based monocular camera IMU sensor UAV. We also present image localization approach support UAV...

10.1109/mcom.2018.1700916 article EN IEEE Communications Magazine 2018-05-01
Coming Soon ...