default search action
Ahmad O. Aseeri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2018
- [b1]Ahmad O. Aseeri:
A machine learning-based security vulnerability study of XOR Arbiter PUFs for resource-constraints internet of things. Texas Tech University, Lubbock, USA, 2018
Journal Articles
- 2024
- [j16]Mohamed Abd Elaziz, Ibrahim Ahmed Fares, Ahmad O. Aseeri:
CKAN: Convolutional Kolmogorov-Arnold Networks Model for Intrusion Detection in IoT Environment. IEEE Access 12: 134837-134851 (2024) - [j15]Adi Alhudhaif, Shtwai Alsubai, Ahmad O. Aseeri, Amita Nandal, Kemal Polat:
Spectrally distinct pixel extraction and kernel filtering for brain tumour diagnosis. Biomed. Signal Process. Control. 98: 106787 (2024) - [j14]Mohamed Abd El Aziz, Abdelghani Dahou, Ahmad O. Aseeri, Ahmed A. Ewees, Mohammed Abdulaziz Aide Al-qaness, Rehab Ali Ibrahim:
Cross vision transformer with enhanced Growth Optimizer for breast cancer detection in IoMT environment. Comput. Biol. Chem. 111: 108110 (2024) - [j13]Mohamed E. Abd Elaziz, Dalia Yousri, Ahmad O. Aseeri, Laith Abualigah, Mohammed Abdulaziz Aide Al-qaness, Ahmed A. Ewees:
Fractional-order modified heterogeneous comprehensive learning particle swarm optimizer for intelligent disease detection in IoMT environment. Swarm Evol. Comput. 84: 101430 (2024) - 2023
- [j12]Mohamed Abd Elaziz, Abdelghani Dahou, Mohammed Azmi Al-Betar, Shaker H. Ali El-Sappagh, Diego Oliva, Ahmad O. Aseeri:
Quantum Artificial Hummingbird Algorithm for Feature Selection of Social IoT. IEEE Access 11: 66257-66278 (2023) - [j11]Mohammed Abdulaziz Aide Al-qaness, Ahmed A. Ewees, Mohamed E. Abd Elaziz, Abdelghani Dahou, Mohammed Azmi Al-Betar, Ahmad O. Aseeri, Dalia Yousri, Rehab Ali Ibrahim:
Boosted Barnacles Algorithm Optimizer: Comprehensive Analysis for Social IoT Applications. IEEE Access 11: 73062-73079 (2023) - [j10]Waleed Nazih, Ahmad O. Aseeri, Osama Youssef Atallah, Shaker H. Ali El-Sappagh:
Vision Transformer Model for Predicting the Severity of Diabetic Retinopathy in Fundus Photography-Based Retina Images. IEEE Access 11: 117546-117561 (2023) - [j9]Mohamed Abd Elaziz, Abdelghani Dahou, Alhassan Mabrouk, Shaker H. Ali El-Sappagh, Ahmad O. Aseeri:
An Efficient Artificial Rabbits Optimization Based on Mutation Strategy For Skin Cancer Prediction. Comput. Biol. Medicine 163: 107154 (2023) - [j8]Ahmad O. Aseeri:
Effective RNN-Based Forecasting Methodology Design for Improving Short-Term Power Load Forecasts: Application to Large-Scale Power-Grid Time Series. J. Comput. Sci. 68: 101984 (2023) - [j7]Abdelghani Dahou, Ahmed A. Ewees, Fatma A. Hashim, Mohammed Abdulaziz Aide Al-qaness, Dina Ahmed Orabi, Eman M. Soliman, Elsayed M. Tag El Din, Ahmad O. Aseeri, Mohamed Abd Elaziz:
Optimizing fake news detection for Arabic context: A multitask learning approach with transformers and an enhanced Nutcracker Optimization Algorithm. Knowl. Based Syst. 280: 111023 (2023) - [j6]Ahmad O. Aseeri:
Effective short-term forecasts of Saudi stock price trends using technical indicators and large-scale multivariate time series. PeerJ Comput. Sci. 9: e1205 (2023) - [j5]Ahmad O. Aseeri:
A Problem-tailored Adversarial Deep Neural Network-Based Attack Model for Feed-Forward Physical Unclonable Functions. ACM Trans. Design Autom. Electr. Syst. 28(4): 59:1-59:18 (2023) - 2021
- [j4]Ahmad O. Aseeri:
Uncertainty-Aware Deep Learning-Based Cardiac Arrhythmias Classification Model of Electrocardiogram Signals. Comput. 10(6): 82 (2021) - 2020
- [j3]Mohammad Alhawarat, Ahmad O. Aseeri:
A Superior Arabic Text Categorization Deep Model (SATCDM). IEEE Access 8: 24653-24661 (2020) - [j2]Usman Tariq, Ahmad O. Aseeri, Mohammed Saeed Alkatheiri, Yu Zhuang:
Context-Aware Autonomous Security Assertion for Industrial IoT. IEEE Access 8: 191785-191794 (2020) - [j1]Ahmad O. Aseeri:
Noise-Resilient Neural Network-Based Adversarial Attack Modeling for XOR Physical Unclonable Functions. J. Cyber Secur. Mobil. 9(2): 331-354 (2020)
Conference and Workshop Papers
- 2020
- [c7]Meznah A. Alamro, Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri:
Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF. IEEE BigData 2020: 1788-1795 - 2019
- [c6]Meznah A. Alamro, Yu Zhuang, Ahmad O. Aseeri, Mohammed Saeed Alkatheiri:
Examination of Double Arbiter PUFs on Security against Machine Learning Attacks. IEEE BigData 2019: 3165-3171 - [c5]Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri:
Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices. PST 2019: 1-9 - 2018
- [c4]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Subspace Pre-learning Approach to Fast High-Accuracy Machine Learning of Large XOR PUFs with Component-Differential Challenges. IEEE BigData 2018: 1563-1568 - [c3]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri, Bipana Thapaliya:
LaHiIO: Accelerating Persistent Big Data Machine Learning via Latency Hiding IOs. IEEE BigData 2018: 2063-2070 - [c2]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things. ICIOT 2018: 49-56 - 2017
- [c1]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Memory Capacity-Aware Algorithm for Fast Clustering of Disk-Resident Big Datasets. DASC/PiCom/DataCom/CyberSciTech 2017: 194-201
Data and Artifacts
- 2018
- [d1]Ahmad O. Aseeri, Mohammed Saeed Alkatheiri, Yu Zhuang:
Physical Unclonable Functions. UCI Machine Learning Repository, 2018
Informal and Other Publications
- 2022
- [i1]Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed Saeed Alkatheiri, Yu Zhuang:
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks. CoRR abs/2206.01314 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint