default search action
Hamed AlQahtani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Hamed Alqahtani, Eatedal Alabdulkreem, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, Chinu Singla, Ahmed S. Salama:
Improved Water Strider Algorithm With Convolutional Autoencoder for Lung and Colon Cancer Detection on Histopathological Images. IEEE Access 12: 949-956 (2024) - [j19]Hamed Alqahtani, Gulshan Kumar:
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems. Eng. Appl. Artif. Intell. 129: 107667 (2024) - [j18]Hamed Alqahtani, Gulshan Kumar:
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects. Eng. Appl. Artif. Intell. 138: 109410 (2024) - [j17]Ali Nauman, Wali Ullah Khan, Ghadah Aldehim, Hamed Alqahtani, Nuha Alruwais, Mesfer Al Duhayyim, Kapal Dev, Hong Min, Lewis Nkenyereye:
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101870 (2024) - 2023
- [j16]Fahad F. Alruwaili, Bayan Ibrahimm Alabdullah, Hamed Alqahtani, Ahmed S. Salama, Gouse Pasha Mohammed, Amani A. Alneil:
Blockchain Enabled Smart Healthcare System Using Jellyfish Search Optimization With Dual-Pathway Deep Convolutional Neural Network. IEEE Access 11: 87583-87591 (2023) - [j15]Latifah Almuqren, Hamed Alqahtani, Sumayh S. Aljameel, Ahmed S. Salama, Ishfaq Yaseen, Amani A. Alneil:
Hybrid Metaheuristics With Machine Learning Based Botnet Detection in Cloud Assisted Internet of Things Environment. IEEE Access 11: 115668-115676 (2023) - [j14]Masoud Alajmi, Hanan Abdullah Mengash, Hamed Alqahtani, Sumayh S. Aljameel, Manar Ahmed Hamza, Ahmed S. Salama:
Automated Threat Detection Using Flamingo Search Algorithm With Optimal Deep Learning on Cyber-Physical System Environment. IEEE Access 11: 127669-127678 (2023) - [j13]Hamed AlQahtani, L. Niranjan, P. Parthasarathy, Azath Mubarakali:
Modified power line system-based energy efficient routing protocol to improve network life time in 5G networks. Comput. Electr. Eng. 106: 108564 (2023) - [j12]Latifah Almuqren, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza, Ahmed S. Salama:
A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment. Sensors 23(17): 7370 (2023) - [j11]Abdelwahed Motwakel, Aisha Hassan Abdalla Hashim, Hayam Alamro, Hamed Alqahtani, Faiz Abdullah Alotaibi, Ahmed Sayed:
Chaotic Mapping Lion Optimization Algorithm-Based Node Localization Approach for Wireless Sensor Networks. Sensors 23(21): 8699 (2023) - 2022
- [j10]Hamed AlQahtani, Gulshan Kumar:
A deep learning-based intrusion detection system for in-vehicle networks. Comput. Electr. Eng. 104(Part): 108447 (2022) - [j9]Najmul Hoda, Naim Ahmad, Hamed AlQahtani, Arshi Naim:
Social Networking Site Usage, Intensity and Online Social Capital: A Comparative Study of LinkedIn and Facebook Users with Implications on Technology-Assisted Learning. Int. J. Emerg. Technol. Learn. 17(9): 52-66 (2022) - [j8]Rony Chowdhury Ripan, Md. Moinul Islam, Hamed AlQahtani, Iqbal H. Sarker:
Effectively predicting cyber-attacks through isolation forest learning-based outlier detection. Secur. Priv. 5(3) (2022) - [j7]Quadri Noorulhasan Naveed, Hamed AlQahtani, Riaz Ullah Khan, Sultan Almakdi, Mohammed S. Alshehri, Mohammed Aref Abdul Rasheed:
An Intelligent Traffic Surveillance System Using Integrated Wireless Sensor Network and Improved Phase Timing Optimization. Sensors 22(9): 3333 (2022) - [j6]Wei Lo, Hamed AlQahtani, Kutub Thakur, Ahmad S. Almadhor, Subhash Chander, Gulshan Kumar:
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic. Veh. Commun. 35: 100471 (2022) - 2021
- [j5]Kutub Thakur, Hamed AlQahtani, Gulshan Kumar:
An intelligent algorithmically generated domain detection system. Comput. Electr. Eng. 92: 107129 (2021) - [c10]Syed Mohammad Minhaz Hossain, Jayed Akbar Sumon, Anik Sen, Md. Iftaker Alam, Khaleque Md. Aashiq Kamal, Hamed AlQahtani, Iqbal H. Sarker:
Spam Filtering of Mobile SMS Using CNN-LSTM Based Deep Learning Model. HIS 2021: 106-116 - [c9]Rubaiath E. Ulfath, Hamed AlQahtani, Mohammad Hammoudeh, Iqbal H. Sarker:
Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection. ICFNDS 2021: 244-251 - 2020
- [j4]Hamed AlQahtani, Manolya Kavakli-Thorne:
Design and Evaluation of an Augmented Reality Game for Cybersecurity Awareness (CybAR). Inf. 11(2): 121 (2020) - [j3]Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed AlQahtani, Paul A. Watters, Alex Ng:
Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1): 41 (2020) - [j2]Iqbal H. Sarker, Hamed AlQahtani, Fawaz Alsolami, Asif Irshad Khan, Yoosef B. Abushark, Mohammad Khubeb Siddiqui:
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling. J. Big Data 7(1): 51 (2020) - [j1]Iqbal H. Sarker, Md. Faisal Faruque, Hamed AlQahtani, Asra Kalim:
K-Nearest Neighbor Learning based Diabetes Mellitus Prediction and Analysis for eHealth Services. EAI Endorsed Trans. Scalable Inf. Syst. 7(26): e4 (2020) - [c8]Hamed Alqahtani, Iqbal H. Sarker, Asra Kalim, Syed Md. Minhaz Hossain, Sheikh Ikhlaq, Sohrab Hossain:
Cyber Intrusion Detection Using Machine Learning Classification Techniques. COMS2 2020: 121-131 - [c7]Hamed AlQahtani, Manolya Kavakli-Thorne, Majed Abdullah Alrowaily:
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR). HCI (30) 2020: 16-31 - [c6]Hamed AlQahtani, Manolya Kavakli-Thorne:
Does Decision-Making Style Predict Individuals' Cybersecurity Avoidance Behaviour? HCI (30) 2020: 32-50 - [c5]Hamed AlQahtani, Manolya Kavakli-Thorne:
Exploring Factors Affecting User's Cybersecurity Behaviour by Using Mobile Augmented Reality App (CybAR). ICCAE 2020: 129-135 - [c4]Hamed Alqahtani, Manolya Kavakli-Thorne:
Factors Affecting Acceptance of a Mobile Augmented Reality Application for Cybersecurity Awareness. ICVARS 2020: 18-26 - [i4]Hamed AlQahtani:
PI-GAN: Learning Pose Independent representations for multiple profile face synthesis. CoRR abs/2001.00645 (2020)
2010 – 2019
- 2019
- [c3]Hamed AlQahtani, Manolya Kavakli-Thorne:
Multi Facet Face Construction. ACPR (2) 2019: 362-370 - [i3]Hamed AlQahtani, Manolya Kavakli-Thorne, Charles Z. Liu:
An Introduction to Person Re-identification with Generative Adversarial Networks. CoRR abs/1904.05992 (2019) - [i2]Hamed AlQahtani, Charles Z. Liu, Manolya Kavakli-Thorne, Yuzhi Kang:
An Agent-Based Intelligent HCI Information System in Mixed Reality. CoRR abs/1911.02726 (2019) - 2018
- [i1]Nazim Uddin Sheikh, Hasina Rahman, Shashwat Vikram, Hamed AlQahtani:
A Lightweight Signature-Based IDS for IoT Environment. CoRR abs/1811.04582 (2018) - 2017
- [c2]Hamed AlQahtani, Manolya Kavakli:
iMAP-CampUS: Developing an Intelligent Mobile Augmented Reality Program on Campus as a Ubiquitous System. ICCAE 2017: 1-5 - [c1]Hamed AlQahtani, Manolya Kavakli:
iMAP-CampUS (an Intelligent Mobile Augmented Reality Program on Campus as a Ubiquitous System): A Theoretical Framework to Measure User's Behavioural Intention. ICCAE 2017: 36-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint