Publications
Moataz, T., Ray, I., Ray, I., Shikfa, A., Cuppens, F., & Cuppens, N. (2018). Substring search over encrypted data. Journal of Computer Security, (Preprint), 1-30.
Senturk, I. F., Balakrishnan, P., Abu-Doleh, A., Kaya, K., Malluhi, Q., & Çatalyürek, Ü. V. (2018). A resource provisioning framework for bioinformatics applications in multi-cloud environments. Future Generation Computer Systems, 78, 379-391.
Djelouat, H., Ali, A. A. S., Amira, A., & Bensaali, F. (2017). Compressive sensing based electronic nose platform. Digital Signal Processing, 60, 350-359.
Ali, A. A. S., Zhai, X., Amira, A., Bensaali, F., & Ramzan, N. (2017). Enhanced Biometric Security and Privacy Using ECG on the Zynq SoC. In Biometric Security and Privacy (pp. 179-202). Springer International Publishing.
Kamran, S., Akhtar, N., Alboudi, A., Kamran, K., Ahmad, A., Inshasi, J., ... & Qidwai, U. (2017). Prediction of infarction volume and infarction growth rate in acute ischemic stroke. Scientific reports, 7(1), 7565.
Soliman, E., Shalaby, S., & Fetais, N. (2017, September). An Interactive Visualization Web Solution for Electricity Consumption in Qatar. In Computer and Applications (ICCA), 2017 International Conference on (pp. 354-359). IEEE.
Fernandez, R., & Fetais, N. (2017, September). Survey of Information Visualization Techniques for Enhancing Visual Analysis. In Computer and Applications (ICCA), 2017 International Conference on (pp. 360-363). IEEE.
Zhai, X., Ali, A. A. S., Amira, A., & Bensaali, F. (2017). ECG encryption and identification based security solution on the Zynq SoC for connected health systems. Journal of Parallel and Distributed Computing, 106, 143-152.
Di Pietro, R., & Oligeri, G. (2017). Enabling broadcast communications in presence of jamming via probabilistic pairing. Computer Networks, 116, 33-46.
Qidwai, U., & Akbar, M. A. (2016, December). Image stitching system with scanning microscopy for histopathological applications. In Biomedical Engineering and Sciences (IECBES), 2016 IEEE EMBS Conference on (pp. 522-527). IEEE.
Qidwai, U., & Akbar, M. A. (2016, December). Image stitching system with scanning microscopy for histopathological applications. In Biomedical Engineering and Sciences (IECBES), 2016 IEEE EMBS Conference on (pp. 522-527). IEEE.
Bahig, H. M., Abbas, M. M., & Mohie-Eldin, M. M. (2017, April). Parallelizing Partial Digest Problem on Multicore System. In International Conference on Bioinformatics and Biomedical Engineering (pp. 95-104). Springer, Cham.
Hu, J., Khan, K. M., Zhang, Y., Bai, Y., & Li, R. (2016). Role updating in information systems using model checking. Knowledge and Information Systems, 1-48.
Asuncion, V., Khan, K. M., Erradi, A., & Alhazbi, S. (2016). Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming. International Journal of Cooperative Information Systems, 25(01), 1650003.
Wang, Y., Malluhi, Q. M., & Khan, K. M. (2016). Garbled computation in cloud. Future Generation Computer Systems, 62, 54-65.
Qidwai, U., Kamran, S., Al-Sulaiti, S., Ahmed, G., & Hegazy, A. (2016, March). Monitoring DVT cuffs for long-term operation: A fuzzy approach. In Signal Processing & Its Applications (CSPA), 2016 IEEE 12th International Colloquium on (pp. 41-45). IEEE.
Zhai, X., Ali, A. A. S., Amira, A., & Bensaali, F. (2016). ECG encryption and identification based security solution on the Zynq SoC for connected health systems. Journal of Parallel and Distributed Computing.
Malluhi, Q. M., Shikfa, A., & Trinh, V. C. (2016, December). An efficient instance hiding scheme. In Proceedings of the Seventh Symposium on Information and Communication Technology (pp. 388-395). ACM.
Wang, Y., & Malluhi, Q. M. (2016, September). Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. In European Symposium on Research in Computer Security (pp. 301-323). Springer International Publishing.
Yasser, E. M., Abbas, M., Malluhi, Q., & Honavar, V. (2016). FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues. PloS one, 11(7), e0158445.
Senturk, I. F., Balakrishnan, P., Abu-Doleh, A., Kaya, K., Malluhi, Q., & Çatalyürek, Ü. V. (2016). A resource provisioning framework for bioinformatics applications in multi-cloud environments. Future Generation Computer Systems.
Rachid, M. H., & Malluhi, Q. (2016, March). Solving All-Pairs Suffix Prefix–Theory and Practice. In Qatar Foundation Annual Research Conference Proceedings (Vol. 2016, No. 1, p. HBPP2066). Qatar: HBKU Press.
Tang, M., Tahboub, R. Y., Aref, W. G., Atallah, M. J., Malluhi, Q. M., Ouzzani, M., & Silva, Y. N. (2016). Similarity group-by operators for multi-dimensional relational data. IEEE Transactions on Knowledge and Data Engineering, 28(2), 510-523.
Zhang, F., Hwang, K., Khan, S. U., & Malluhi, Q. M. (2016). Skyline Discovery and Composition of Multi-Cloud Mashup Services. IEEE Transactions on Services Computing, 9(1), 72-83.
Malik, S. U. R., Khan, S. U., Ewen, S. J., Tziritas, N., Kolodziej, J., Zomaya, A. Y., & Malluhi, Q. M. (2016)Performance analysis of data intensive cloud systems based on data management and replication: a survey. IEEE Transactions on Knowledge and Data Engineering, 28(2), 510-523. )
Rihan, R. A., & Khan, K. M. (2016, October). Using Block Cipher for Confidentiality of Images in Cloud-Based Systems. In Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on (pp. 28-33). IEEE.
Qidwai, U., Shakir, M., & Bahameish, M. (2015, November). Real-time robotic avatar control using fuzzy gaze-classification for people with disability. In 2015 IEEE International Conference on Control System, Computing and Engineering (ICCSCE) (pp. 401-406). IEEE.
Qidwai, U., & Ajimsha, M. S. (2015, July). Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy?. In Science and Information Conference (SAI), 2015 (pp. 756-760). IEEE.
Wang, Y. (2015). Secure Random Linear Code Based Public Key Encryption Scheme RLCE. IACR Cryptology ePrint Archive, 2015, 298.
Wang, Y. (2015). Privacy-preserving data storage in cloud using array BP-XOR codes. IEEE Transactions on Cloud Computing, 3(4), 425-435.
Zhang, F., Malluhi, Q. M., Elsayed, T., Khan, S. U., Li, K., & Zomaya, A. Y. (2015). CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems. Future Generation Computer Systems, 51, 98-110.
Nassar, M., Erradi, A., & Malluhi, Q. M. (2015, October). Paillier's encryption: Implementation and cloud applications. In Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on (pp. 1-5). IEEE.
Nassar, M., Erradi, A., & Malluhi, Q. M. (2015, September). A Domain Specific Language for Secure Outsourcing of Computation to the Cloud. In Enterprise Distributed Object Computing Conference (EDOC), 2015 IEEE 19th International (pp. 134-141). IEEE.
Haj Rachid, M., & Malluhi, Q. (2015). A Practical and Scalable Tool to Find Overlaps between Sequences. BioMed research international, 2015.
Abbas, M. M., Balakrishnan, P., & Malluhi, Q. M. (2015, April). Evaluation of Combined Genome Assemblies: A Case Study with Fungal Genomes. In International Conference on Bioinformatics and Biomedical Engineering (pp. 333-344). Springer International Publishing.
al Bouna, B., Clifton, C., & Malluhi, Q. (2015). Anonymizing transactional datasets. Journal of Computer Security, 23(1), 89-106.
Zhang, F., Malluhi, Q. M., Elsayed, T., Khan, S. U., Li, K., & Zomaya, A. Y. (2015). CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems. Future Generation Computer Systems, 51, 98-110.
Khan, K. M., & Shaheen, M. (2014, October). Empowering users of cloud computing on data confidentiality. In Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on (pp. 272-274). IEEE.
Qidwai, U., Shakir, M., & Musa, N. (2014, November). Wirelessly controlled mimicing humanoid robot. In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA) (pp. 156-160). IEEE.
Shakir, M., Malik, A. S., Kamel, N., & Qidwai, U. (2014, August). Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data. In Science and Information Conference (SAI), 2014 (pp. 276-279). IEEE.
Shakir, M., Malik, A. S., Kamel, N., & Qidwai, U. (2014). Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State. In Fifth International Conference on Intelligent Systems, Modelling and Simulation, Malaysia.
Abbas, M. M., Malluhi, Q. M., & Balakrishnan, P. (2014). Assessment of de novo assemblers for draft genomes: a case study with fungal genomes. BMC genomics, 15(9), 1.
Sabry, F., Erradi, A., Nassar, M., & Malluhi, Q. M. (2014, November). Automatic Generation of Optimized Workflow for Distributed Computations on Large-Scale Matrices. In International Conference on Service-Oriented Computing (pp. 79-92). Springer Berlin Heidelberg.
Nassar, M., Erradi, A., Sabry, F., & Malluhi, Q. M. (2014, June). A Model Driven Framework for Secure Outsourcing of Computation to the Cloud. In 2014 IEEE 7th International Conference on Cloud Computing (pp. 968-969). IEEE.
Abbas, M. M., Malluhi, Q. M., & Balakrishnan, P. (2014, June). Scalable Multi-core Implementation for Motif Finding Problem. In 2014 IEEE 13th International Symposium on Parallel and Distributed Computing (pp. 178-183). IEEE.
Haj Rachid, M., Malluhi, Q., & Abouelhoda, M. (2014). Using the sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem. BioMed research international, 2014.