Search Results - "Mahmoud, Mohamed M. E. A."
-
1
Privacy-Preserving Charging Coordination Scheme for Smart Power Grids Using a Blockchain
Published in Energies (Basel) (01-12-2022)“…With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor that merges energy storage units (ESUs) into the grid in…”
Get full text
Journal Article -
2
PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
Published in IEEE access (2019)“…In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every…”
Get full text
Journal Article -
3
Smart Parking System with Privacy Preservation and Reputation Management Using Blockchain
Published in IEEE access (01-01-2020)“…Most of the existing smart parking systems threaten the drivers' privacy by revealing information about their visited locations. Moreover, they are centralized…”
Get full text
Journal Article -
4
Real-Time Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning
Published in IEEE access (2022)“…In the advanced metering infrastructure, smart meters are deployed at the consumers' side to regularly transmit fine-grained electricity consumption readings…”
Get full text
Journal Article -
5
An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms
Published in IEEE access (01-01-2019)“…In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a…”
Get full text
Journal Article -
6
Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids
Published in IEEE access (01-01-2023)“…In smart power grids, smart meters (SMs) are deployed at the end side of customers to report fine-grained power consumption readings periodically to the…”
Get full text
Journal Article -
7
EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks
Published in IEEE access (2019)“…Advanced metering infrastructure (AMI) networks allow the data collection of consumers' fine-grained power consumption data (PCD) to perform real-time…”
Get full text
Journal Article -
8
Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks
Published in IEEE access (2023)“…In smart power grids, electricity theft causes huge economic losses to electrical utility companies. Machine learning (ML), especially deep neural network…”
Get full text
Journal Article -
9
Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure
Published in IEEE access (01-01-2023)“…For energy management and billing purposes, advanced metering infrastructure (AMI) requires periodic transmission of consumer power consumption readings by…”
Get full text
Journal Article -
10
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks
Published in IEEE transactions on parallel and distributed systems (01-08-2014)“…We propose lightweight protocol for securing communication and preserving users' anonymity and location privacy in hybrid ad hoc networks…”
Get full text
Journal Article -
11
Countering Evasion Attacks for Smart Grid Reinforcement Learning-based Detectors
Published in IEEE access (01-01-2023)“…Fraudulent customers in smart power grids employ cyber-attacks by manipulating their smart meters and reporting false consumption readings to reduce their…”
Get full text
Journal Article -
12
Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks with Vector Embedding
Published in IEEE access (01-01-2023)“…Charging coordination mechanisms have been adopted to avoid overloading the power grid and long waiting times for electric vehicles' (EVs) drivers at charging…”
Get full text
Journal Article -
13
Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability
Published in IEEE access (2021)“…In advanced health care systems, patients' medical data can be outsourced to cloud servers to enable remote healthcare service providers to access and analyze…”
Get full text
Journal Article -
14
Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain
Published in IEEE open journal of the Communications Society (2021)“…The fifth generation (5G) cellular network provides users with high-quality services due to its high transmission rate and low latency. It will support…”
Get full text
Journal Article -
15
Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning
Published in IEEE access (2020)“…Because charging coordination is a solution for avoiding grid instability by prioritizing charging requests, electric vehicles may lie and send false data to…”
Get full text
Journal Article -
16
Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles
Published in IEEE transactions on vehicular technology (01-09-2021)“…An energy trading system is essential for the successful integration of Electric Vehicles (EVs) into the smart grid. In this paper, leveraging blockchain…”
Get full text
Journal Article -
17
Privacy-Preserving Route Reporting Schemes for Traffic Management Systems
Published in IEEE transactions on vehicular technology (01-03-2017)“…In this paper, we propose privacy-preserving route reporting schemes for traffic management for both infrastructure-supported and self-organizing vehicular ad…”
Get full text
Journal Article -
18
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs
Published in IEEE transactions on dependable and secure computing (01-01-2022)“…Vehicular Ad Hoc Networks (VANETs) have the potential to enable the next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by…”
Get full text
Journal Article -
19
B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain
Published in IEEE transactions on network science and engineering (01-04-2021)“…Ride-sharing is a service that enables drivers to share trips with other riders, contributing to appealing benefits of shared travel cost and reducing traffic…”
Get full text
Journal Article -
20
Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings
Published in IEEE systems journal (01-09-2021)“…Despite being equipped with advanced metering infrastructure (AMI), utility companies are subjected to electricity theft cyber-attacks. The existing machine…”
Get full text
Journal Article