default search action
Qutaibah M. Malluhi
- > Home > Persons > Qutaibah M. Malluhi
Publications
- 2024
- [c69]Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. AFRICACRYPT 2024: 149-173 - [i9]Tamer Ahmed Eltaras, Qutaibah M. Malluhi, Alessandro Savino, Stefano Di Carlo, Adnan Qayyum, Junaid Qadir:
R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients. CoRR abs/2406.04227 (2024) - 2023
- [j41]Naheel Faisal Kamal, Abdulla Khalid Al-Ali, Abdulaziz Al-Ali, Sertac Bayhan, Qutaibah M. Malluhi:
LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids. IEEE Access 11: 95358-95367 (2023) - [j40]Kenan Begovic, Abdulaziz Al-Ali, Qutaibah M. Malluhi:
Cryptographic ransomware encryption detection: Survey. Comput. Secur. 132: 103349 (2023) - [c68]Farida Sabry, Wadha Labda, Tamer Eltaras, Fatima Hamza, Khawla Elzoubi, Qutaibah M. Malluhi:
Wearable Data Generation Using Time-Series Generative Adversarial Networks for Hydration Monitoring. BIOSIGNALS 2023: 94-105 - [c67]Maryam Mohammadi, Farida Sabry, Wadha Labda, Qutaibah M. Malluhi:
Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy. IWSPA@CODASPY 2023: 45-53 - [c66]Hussein A. Aly, Abdulaziz Alali, Abdulla K. Al-Ali, Qutaibah M. Malluhi:
Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data. ISGT EUROPE 2023: 1-5 - [i8]Kenan Begovic, Abdulaziz Al-Ali, Qutaibah M. Malluhi:
Cryptographic ransomware encryption detection: Survey. CoRR abs/2306.12008 (2023) - [i7]Hussein Aly, Abdulaziz Al-Ali, Abdullah Al-Ali, Qutaibah M. Malluhi:
A Blackbox Model Is All You Need to Breach Privacy: Smart Grid Forecasting Models as a Use Case. CoRR abs/2309.01523 (2023) - 2022
- [j37]Farida Sabry, Tamer Eltaras, Wadha Labda, Fatima Hamza, Khawla Alzoubi, Qutaibah M. Malluhi:
Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data. Sensors 22(5): 1887 (2022) - [c65]Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs. ISC 2022: 3-19 - 2021
- [j36]Muhammad Usama, Qutaibah M. Malluhi, Nordin Zakaria, Imran Razzak, Waheed Iqbal:
An efficient secure data compression technique based on chaos and adaptive Huffman coding. Peer-to-Peer Netw. Appl. 14(5): 2651-2664 (2021) - [c64]Naheel Faisal Kamal, Qutaibah M. Malluhi:
Client-Based Secure IoT Data Sharing using Untrusted Clouds. WF-IoT 2021: 409-414 - 2020
- [j35]Naram Mhaisen, Qutaibah M. Malluhi:
Data Consistency in Multi-Cloud Storage Systems With Passive Servers and Non-Communicating Clients. IEEE Access 8: 164977-164986 (2020) - [j34]Farida Sabry, Wadha Labda, Aiman Erbad, Qutaibah M. Malluhi:
Cryptocurrencies and Artificial Intelligence: Challenges and Opportunities. IEEE Access 8: 175840-175858 (2020) - [j33]Ahmad Qadeib Alban, Fahad Islam, Qutaibah M. Malluhi, Ali Jaoua:
Anomalies Detection in Software by Conceptual Learning From Normal Executions. IEEE Access 8: 179845-179856 (2020) - [j32]Maan Haj Rachid, Ryan D. Riley, Qutaibah M. Malluhi:
Enclave-based oblivious RAM using Intel's SGX. Comput. Secur. 91: 101711 (2020) - [j31]Mingjie Tang, Yongyang Yu, Ahmed R. Mahmood, Qutaibah M. Malluhi, Mourad Ouzzani, Walid G. Aref:
LocationSpark: In-memory Distributed Spatial Query Processing and Optimization. Frontiers Big Data 3: 30 (2020) - [j30]Omar Abou Selo, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. Secur. Commun. Networks 2020: 3042642:1-3042642:10 (2020) - [j29]Qutaibah M. Malluhi, Vinh Duc Tran, Viet Cuong Trinh:
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption. Symmetry 12(6): 969 (2020) - [c63]Israa Alsarsour, Qutaibah M. Malluhi, Yongge Wang:
Free Chain: Enabling Freedom of Expression through Public Blockchains. DependSys 2020: 33-40 - 2019
- [j28]Yongge Wang, Qutaibah M. Malluhi:
The limit of blockchains: infeasibility of a smart Obama-Trump contract. Commun. ACM 62(5): 64-69 (2019) - [j27]Qutaibah M. Malluhi, Abdullatif Shikfa, Vinh Duc Tran, Viet Cuong Trinh:
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices. Comput. Commun. 145: 113-125 (2019) - [j25]Mohamed Nassar, Qutaibah M. Malluhi, Mikhail J. Atallah, Abdullatif Shikfa:
Securing Aggregate Queries for DNA Databases. IEEE Trans. Cloud Comput. 7(3): 827-837 (2019) - [c61]Yongge Wang, Qutaibah M. Malluhi:
Reusable Garbled Turing Machines Without FHE. C2SI 2019: 381-398 - [c60]Mingjie Tang, Yongyang Yu, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
Efficient Parallel Skyline Query Processing for High-Dimensional Data. ICDE 2019: 2113-2114 - [c59]Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, Tianyuan Xie:
Breaking HK17 in Practice. ISIT 2019: 1877-1881 - [c58]Farida Sabry, Wadha Labda, Aiman Erbad, Husam Al Jawaheri, Qutaibah M. Malluhi:
Anonymity and Privacy in Bitcoin Escrow Trades. WPES@CCS 2019: 211-220 - [i6]Mingjie Tang, Yongyang Yu, Walid G. Aref, Ahmed R. Mahmood, Qutaibah M. Malluhi, Mourad Ouzzani:
LocationSpark: In-memory Distributed Spatial Query Processing and Optimization. CoRR abs/1907.03736 (2019) - 2018
- [j24]Khaleel Mershad, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Michael Gribskov, Walid G. Aref:
AUDIT: approving and tracking updates with dependencies in collaborative databases. Distributed Parallel Databases 36(1): 81-119 (2018) - [j23]Khaleel Mershad, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Michael Gribskov, Walid G. Aref, Deo Prakash:
COACT: a query interface language for collaborative databases. Distributed Parallel Databases 36(1): 121-151 (2018) - [j22]Izzet F. Senturk, Ponnuraman Balakrishnan, Anas Abu-Doleh, Kamer Kaya, Qutaibah M. Malluhi, Ümit V. Çatalyürek:
A resource provisioning framework for bioinformatics applications in multi-cloud environments. Future Gener. Comput. Syst. 78: 379-391 (2018) - [j21]MingJie Tang, Yongyang Yu, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
Efficient Parallel Skyline Query Processing for High-Dimensional Data. IEEE Trans. Knowl. Data Eng. 30(10): 1838-1851 (2018) - [c57]Mohamed Nassar, Qutaibah M. Malluhi, Tanveer Khan:
A Scheme for Three-way Secure and Verifiable E-Voting. AICCSA 2018: 1-6 - [i5]Yongge Wang, Qutaibah M. Malluhi:
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. IACR Cryptol. ePrint Arch. 2018: 252 (2018) - 2017
- [c56]Mayur Punekar, Qutaibah M. Malluhi, Yongge Wang, Yvo Desmedt:
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. BDCAT 2017: 33-42 - [c55]Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. CANS 2017: 470-481 - [c54]Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. AsiaCCS 2017: 230-240 - [c53]Yongyang Yu, MingJie Tang, Walid G. Aref, Qutaibah M. Malluhi, Mostafa M. Abbas, Mourad Ouzzani:
In-Memory Distributed Matrix Computation Processing and Optimization. ICDE 2017: 1047-1058 - [i4]Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. IACR Cryptol. ePrint Arch. 2017: 41 (2017) - [i3]Yongge Wang, Qutaibah M. Malluhi:
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project. IACR Cryptol. ePrint Arch. 2017: 1258 (2017) - 2016
- [j20]Abdul Hameed, Alireza Khoshkbarforoushha, Rajiv Ranjan, Prem Prakash Jayaraman, Joanna Kolodziej, Pavan Balaji, Sherali Zeadally, Qutaibah Marwan Malluhi, Nikos Tziritas, Abhinav Vishnu, Samee U. Khan, Albert Y. Zomaya:
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing 98(7): 751-774 (2016) - [j19]Saif Ur Rehman Malik, Samee U. Khan, Sam J. Ewen, Nikos Tziritas, Joanna Kolodziej, Albert Y. Zomaya, Sajjad Ahmad Madani, Nasro Min-Allah, Lizhe Wang, Cheng-Zhong Xu, Qutaibah M. Malluhi, Johnatan E. Pecero, Pavan Balaji, Abhinav Vishnu, Rajiv Ranjan, Sherali Zeadally, Hongxiang Li:
Performance analysis of data intensive cloud systems based on data management and replication: a survey. Distributed Parallel Databases 34(2): 179-215 (2016) - [j18]Yongge Wang, Qutaibah M. Malluhi, Khaled Md. Khan:
Garbled computation in cloud. Future Gener. Comput. Syst. 62: 54-65 (2016) - [j17]Wadha J. Al Marri, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Walid G. Aref:
The similarity-aware relational database set operators. Inf. Syst. 59: 79-93 (2016) - [j16]MingJie Tang, Yongyang Yu, Qutaibah M. Malluhi, Mourad Ouzzani, Walid G. Aref:
LocationSpark: A Distributed In-Memory Data Management System for Big Spatial Data. Proc. VLDB Endow. 9(13): 1565-1568 (2016) - [j15]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-Dimensional Relational Data. IEEE Trans. Knowl. Data Eng. 28(2): 510-523 (2016) - [j14]Fan Zhang, Kai Hwang, Samee U. Khan, Qutaibah M. Malluhi:
Skyline Discovery and Composition of Multi-Cloud Mashup Services. IEEE Trans. Serv. Comput. 9(1): 72-83 (2016) - [c52]Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. ESORICS (1) 2016: 301-323 - [c51]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-By operators for multi-dimensional relational data. ICDE 2016: 1448-1449 - [c50]Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
An efficient instance hiding scheme. SoICT 2016: 388-395 - 2015
- [j13]Fan Zhang, Qutaibah M. Malluhi, Tamer Elsayed, Samee U. Khan, Keqin Li, Albert Y. Zomaya:
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems. Future Gener. Comput. Syst. 51: 98-110 (2015) - [j12]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Anonymizing transactional datasets. J. Comput. Secur. 23(1): 89-106 (2015) - [c49]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Efficient Sanitization of Unsafe Data Correlations. EDBT/ICDT Workshops 2015: 278-285 - [c48]MingJie Tang, Yongyang Yu, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
Efficient Processing of Hamming-Distance-Based Similarity-Search Queries Over MapReduce. EDBT 2015: 361-372 - [c47]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud. EDOC 2015: 134-141 - [c46]Khaleel Mershad, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Walid G. Aref:
Approving Updates in Collaborative Databases. IC2E 2015: 42-47 - [c45]Mostafa M. Abbas, Ponnuraman Balakrishnan, Qutaibah M. Malluhi:
Evaluation of Combined Genome Assemblies: A Case Study with Fungal Genomes. IWBBIO (2) 2015: 333-344 - [e1]Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez-González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, Farkhund Iqbal:
Distributed Computing and Artificial Intelligence, 12th International Conference, DCAI 2015, Salamanca, Spain, June 3-5, 2015. Advances in Intelligent Systems and Computing 373, Springer 2015, ISBN 978-3-319-19637-4 [contents] - 2014
- [c44]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
A Model Driven Framework for Secure Outsourcing of Computation to the Cloud. IEEE CLOUD 2014: 968-969 - [c43]Amel Hamzaoui, Qutaibah M. Malluhi, Chris Clifton, Ryan D. Riley:
Association Rule Mining on Fragmented Database. DPM/SETOP/QASA 2014: 335-342 - [c42]Farida Sabry, Abdelkarim Erradi, Mohamed Nassar, Qutaibah M. Malluhi:
Automatic Generation of Optimized Workflow for Distributed Computations on Large-Scale Matrices. ICSOC 2014: 79-92 - [c41]Mostafa M. Abbas, Qutaibah M. Malluhi, Ponnuraman Balakrishnan:
Scalable Multi-core Implementation for Motif Finding Problem. ISPDC 2014: 178-183 - [c40]Wadha J. Al Marri, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Walid G. Aref:
The Similarity-Aware Relational Intersect Database Operator. SISAP 2014: 164-175 - [i2]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
On Order-independent Semantics of the Similarity Group-By Relational Database Operator. CoRR abs/1412.4303 (2014) - [i1]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-dimensional Relational Data. CoRR abs/1412.4842 (2014) - 2013
- [j11]Khaled M. Khan, Qutaibah M. Malluhi:
Trust in Cloud Services: Providing More Controls to Clients. Computer 46(7): 94-96 (2013) - [j10]Khaled M. Khan, Qutaibah M. Malluhi:
Role of contextual properties in enterprise service migration to cloud computing. Concurr. Comput. Pract. Exp. 25(18): 2455-2470 (2013) - [c39]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
Secure Outsourcing of Matrix Operations as a Service. IEEE CLOUD 2013: 918-925 - [c38]Mohamed Nassar, Bechara al Bouna, Qutaibah M. Malluhi:
Secure Outsourcing of Network Flow Data Analysis. BigData Congress 2013: 431-432 - [c37]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Using Safety Constraint for Transactional Dataset Anonymization. DBSec 2013: 164-178 - [c36]Ahmet Erhan Nergiz, Chris Clifton, Qutaibah M. Malluhi:
Updating outsourced anatomized private databases. EDBT 2013: 179-190 - [c35]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
Practical and Secure Outsourcing of Matrix Computations to the Cloud. ICDCS Workshops 2013: 70-75 - [c34]Shumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi:
Secure and Private Outsourcing of Shape-Based Feature Extraction. ICICS 2013: 90-99 - [c33]Fan Zhang, Qutaibah M. Malluhi, Tamer M. Elsyed:
ConMR: Concurrent MapReduce Programming Model for Large Scale Shared-Data Applications. ICPP 2013: 671-679 - [c32]Ryan D. Riley, Chris Clifton, Qutaibah M. Malluhi:
Maintaining Database Anonymity in the Presence of Queries. STM 2013: 33-48 - 2012
- [c31]Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi:
Secure and Efficient Outsourcing of Sequence Comparisons. ESORICS 2012: 505-522 - 2011
- [c30]Khaled M. Khan, Qutaibah M. Malluhi:
Identifying Contextual Properties of Software Architecture in Cloud Computing. DASC 2011: 561-568 - 2010
- [j9]Khaled M. Khan, Qutaibah M. Malluhi:
Establishing Trust in Cloud Computing. IT Prof. 12(5): 20-27 (2010) - [c29]Khaled M. Khan, Qutaibah M. Malluhi:
Security-Aware Service Composition for End Users of Small Enterprises. SoMeT 2010: 257-267 - 2008
- [c26]Noora AlNaimi, Nuha Barhoum, Abeer Nasser, Alia Swidan, Qutaibah M. Malluhi:
A system for automatic gathering and intelligent analyses of Doha traffic data. AICCSA 2008: 935-936 - [c25]Tarek M. El-Fouly, Mohammed Saleh, Qutaibah M. Malluhi:
Efficient Forward Error Correction for Reliable Transmission in Packet Networks. PDPTA 2008: 103-109
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint