Search Results - "Mahmoud, Mohamed M. E. A."

Refine Results
  1. 1

    Privacy-Preserving Charging Coordination Scheme for Smart Power Grids Using a Blockchain by Habbak, Hany, Baza, Mohamed, Mahmoud, Mohamed M. E. A., Metwally, Khaled, Mattar, Ahmed, Salama, Gouda I.

    Published in Energies (Basel) (01-12-2022)
    “…With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor that merges energy storage units (ESUs) into the grid in…”
    Get full text
    Journal Article
  2. 2

    PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks by Nabil, Mahmoud, Ismail, Muhammad, Mahmoud, Mohamed M. E. A., Alasmary, Waleed, Serpedin, Erchin

    Published in IEEE access (2019)
    “…In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every…”
    Get full text
    Journal Article
  3. 3

    Smart Parking System with Privacy Preservation and Reputation Management Using Blockchain by Badr, Mahmoud M., Amiri, Wesam Al, Fouda, Mostafa M., Mahmoud, Mohamed, Aljohani, Abdulah J., Alasmary, Waleed

    Published in IEEE access (01-01-2020)
    “…Most of the existing smart parking systems threaten the drivers' privacy by revealing information about their visited locations. Moreover, they are centralized…”
    Get full text
    Journal Article
  4. 4

    Real-Time Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning by Abdulaal, Mohammed J., Ibrahem, Mohamed I., Mahmoud, Mohamed M. E. A., Khalid, Junaid, Aljohani, Abdulah Jeza, Milyani, Ahmad H., Abusorrah, Abdullah M.

    Published in IEEE access (2022)
    “…In the advanced metering infrastructure, smart meters are deployed at the consumers' side to regularly transmit fine-grained electricity consumption readings…”
    Get full text
    Journal Article
  5. 5

    An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms by WazirAli, Ranyiah, Alasmary, Waleed, Mahmoud, Mohamed, Alhindi, Ahmad

    Published in IEEE access (01-01-2019)
    “…In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a…”
    Get full text
    Journal Article
  6. 6

    Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids by El-Toukhy, Ahmed T., Badr, Mahmoud M., Mahmoud, Mohamed, Srivastava, Gautam, Fouda, Mostafa M., Alsabaan, Maazen

    Published in IEEE access (01-01-2023)
    “…In smart power grids, smart meters (SMs) are deployed at the end side of customers to report fine-grained power consumption readings periodically to the…”
    Get full text
    Journal Article
  7. 7

    EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks by Alsharif, Ahmad, Nabil, Mahmoud, Mahmoud, Mohamed M. E. A., Abdallah, Mohamed

    Published in IEEE access (2019)
    “…Advanced metering infrastructure (AMI) networks allow the data collection of consumers' fine-grained power consumption data (PCD) to perform real-time…”
    Get full text
    Journal Article
  8. 8

    Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks by Elgarhy, Islam, Badr, Mahmoud M., Mahmoud, Mohamed M. E. A., Fouda, Mostafa M., Alsabaan, Maazen, Kholidy, Hisham A.

    Published in IEEE access (2023)
    “…In smart power grids, electricity theft causes huge economic losses to electrical utility companies. Machine learning (ML), especially deep neural network…”
    Get full text
    Journal Article
  9. 9

    Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure by Abdulaal, Mohammed J., Mahmoud, Mohamed, Bello, Saheed A., Khalid, Junaid, Aljohani, Abdulah Jeza, Milyani, Ahmad H., Abusorrah, Abdullah M., Ibrahem, Mohamed I.

    Published in IEEE access (01-01-2023)
    “…For energy management and billing purposes, advanced metering infrastructure (AMI) requires periodic transmission of consumer power consumption readings by…”
    Get full text
    Journal Article
  10. 10

    Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks by Mahmoud, Mohamed M. E. A., Taha, Sanaa, Misic, Jelena, Xuemin Shen

    “…We propose lightweight protocol for securing communication and preserving users' anonymity and location privacy in hybrid ad hoc networks…”
    Get full text
    Journal Article
  11. 11

    Countering Evasion Attacks for Smart Grid Reinforcement Learning-based Detectors by El-Toukhy, Ahmed T., Mahmoud, Mohamed M. E. A., Bondok, Atef H., Fouda, Mostafa M., Alsabaan, Maazen

    Published in IEEE access (01-01-2023)
    “…Fraudulent customers in smart power grids employ cyber-attacks by manipulating their smart meters and reporting false consumption readings to reduce their…”
    Get full text
    Journal Article
  12. 12

    Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks with Vector Embedding by Shafee, Ahmed, Mahmoud, Mohamed, Srivastava, Gautam, Fouda, Mostafa M., Alsabaan, Maazen, Ibrahem, Mohamed

    Published in IEEE access (01-01-2023)
    “…Charging coordination mechanisms have been adopted to avoid overloading the power grid and long waiting times for electric vehicles' (EVs) drivers at charging…”
    Get full text
    Journal Article
  13. 13

    Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability by Abdelfattah, Sherif, Baza, Mohamed, Badr, Mahmoud M., Mahmoud, Mohamed M. E. A., Srivastava, Gautam, Alsolami, Fawaz, Ali, Abdullah Marish

    Published in IEEE access (2021)
    “…In advanced health care systems, patients' medical data can be outsourced to cloud servers to enable remote healthcare service providers to access and analyze…”
    Get full text
    Journal Article
  14. 14

    Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain by Haddad, Zaher, Baza, Mohamed, Mahmoud, Mohamed M. E. A., Alasmary, Waleed, Alsolami, Fawaz

    “…The fifth generation (5G) cellular network provides users with high-quality services due to its high transmission rate and low latency. It will support…”
    Get full text
    Journal Article
  15. 15

    Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning by Shafee, Ahmed A., Fouda, Mostafa M., Mahmoud, Mohamed M. E. A., Aljohani, Abdulah Jeza, Alasmary, Waleed, Amsaad, Fathi

    Published in IEEE access (2020)
    “…Because charging coordination is a solution for avoiding grid instability by prioritizing charging requests, electric vehicles may lie and send false data to…”
    Get full text
    Journal Article
  16. 16

    Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles by Baza, Mohamed, Sherif, Ahmed, Mahmoud, Mohamed M. E. A., Bakiras, Spiridon, Alasmary, Waleed, Abdallah, Mohamed, Lin, Xiaodong

    Published in IEEE transactions on vehicular technology (01-09-2021)
    “…An energy trading system is essential for the successful integration of Electric Vehicles (EVs) into the smart grid. In this paper, leveraging blockchain…”
    Get full text
    Journal Article
  17. 17

    Privacy-Preserving Route Reporting Schemes for Traffic Management Systems by Rabieh, Khaled, Mahmoud, Mohamed M. E. A., Younis, Mohamed

    Published in IEEE transactions on vehicular technology (01-03-2017)
    “…In this paper, we propose privacy-preserving route reporting schemes for traffic management for both infrastructure-supported and self-organizing vehicular ad…”
    Get full text
    Journal Article
  18. 18

    Detecting Sybil Attacks Using Proofs of Work and Location in VANETs by Baza, Mohamed, Nabil, Mahmoud, Mahmoud, Mohamed M. E. A., Bewermeier, Niclas, Fidan, Kemal, Alasmary, Waleed, Abdallah, Mohamed

    “…Vehicular Ad Hoc Networks (VANETs) have the potential to enable the next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by…”
    Get full text
    Journal Article
  19. 19

    B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain by Baza, Mohamed, Lasla, Noureddine, Mahmoud, Mohamed M. E. A., Srivastava, Gautam, Abdallah, Mohamed

    “…Ride-sharing is a service that enables drivers to share trips with other riders, contributing to appealing benefits of shared travel cost and reducing traffic…”
    Get full text
    Journal Article
  20. 20

    Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings by Takiddin, Abdulrahman, Ismail, Muhammad, Nabil, Mahmoud, Mahmoud, Mohamed M. E. A., Serpedin, Erchin

    Published in IEEE systems journal (01-09-2021)
    “…Despite being equipped with advanced metering infrastructure (AMI), utility companies are subjected to electricity theft cyber-attacks. The existing machine…”
    Get full text
    Journal Article