default search action
Kadhim Hayawi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Dongyang Huo, Kadhim Hayawi, Asad Waqar Malik, Sri Devi Ravana:
Enhancing Anomaly Detection in Agricultural IoT Systems through Incremental Learning with Spike Neural Networks. HICSS 2024: 1201-1209 - [i5]Kadhim Hayawi, Sakib Shahriar, Mohamed Adel Serhani, Eiman Alothali:
Inevitable-Metaverse: A Novel Twitter Dataset for Public Sentiments on Metaverse. CoRR abs/2403.01095 (2024) - [i4]Sakib Shahriar, Brady D. Lund, Nishith Reddy Mannuru, Muhammad Arbab Arshad, Kadhim Hayawi, Ravi Varma Kumar Bevara, Aashrith Mannuru, Laiba Batool:
Putting GPT-4o to the Sword: A Comprehensive Evaluation of Language, Vision, Speech, and Multimodal Proficiency. CoRR abs/2407.09519 (2024) - 2023
- [j15]Kadhim Hayawi, Zahid Anwar, Asad W. Malik, Zouheir Trabelsi:
Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities. IEEE Internet Things J. 10(21): 18941-18950 (2023) - [j14]Yi Chen, Kadhim Hayawi, Jianxin He, Huanhuan Song, Jiarui Wang:
Impact and Challenges of Intelligent IoT in Meteorological Science. IEEE Internet Things Mag. 6(2): 58-63 (2023) - [j13]Kadhim Hayawi, Susmita Saha, Mohammad Mehedy Masud, Sujith Samuel Mathew, Mohammed Kaosar:
Social media bot detection with deep learning methods: a systematic review. Neural Comput. Appl. 35(12): 8903-8918 (2023) - [j12]Mohamed Adel Serhani, Haftay Gebreslasie Abreha, Asadullah Tariq, Mohammad Hayajneh, Yang Xu, Kadhim Hayawi:
Dynamic Data Sample Selection and Scheduling in Edge Federated Learning. IEEE Open J. Commun. Soc. 4: 2133-2149 (2023) - [c14]Kadhim Hayawi, Sakib Shahriar, Hany Alashwal:
Leveraging Nucleotide Dependencies for Improved mRNA Vaccine Degradation Prediction. AICCSA 2023: 1-6 - [i3]Sakib Shahriar, Kadhim Hayawi:
Let's have a chat! A Conversation with ChatGPT: Technology, Applications, and Limitations. CoRR abs/2302.13817 (2023) - [i2]Kadhim Hayawi, Sakib Shahriar, Sujith Samuel Mathew:
The Imitation Game: Detecting Human and AI-Generated Texts in the Era of Large Language Models. CoRR abs/2307.12166 (2023) - 2022
- [j11]Sujith Samuel Mathew, Kadhim Hayawi, Nahom Aron Dawit, Ikbal Taleb, Zouheir Trabelsi:
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey. Clust. Comput. 25(6): 4129-4149 (2022) - [j10]Tariq Qayyum, Zouheir Trabelsi, Asad Waqar Malik, Kadhim Hayawi:
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT). J. Cloud Comput. 11: 72 (2022) - [j9]Tariq Qayyum, Zouheir Trabelsi, Asad W. Malik, Kadhim Hayawi:
Trajectory Design for UAV-Based Data Collection Using Clustering Model in Smart Farming. Sensors 22(1): 37 (2022) - [j8]Yi Chen, Kadhim Hayawi, Qian Zhao, Junjie Mou, Ling Yang, Jie Tang, Qing Li, Hong Wen:
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. Sensors 22(18): 6789 (2022) - [j7]Yi Chen, Kadhim Hayawi, Meikai Fan, Shih Yu Chang, Jie Tang, Ling Yang, Rui Zhao, Zhongqi Mao, Hong Wen:
A Bilevel Optimization Model Based on Edge Computing for Microgrid. Sensors 22(20): 7710 (2022) - [j6]Kadhim Hayawi, Sujith Samuel Mathew, Neethu Venugopal, Mohammad M. Masud, Pin-Han Ho:
DeeProBot: a hybrid deep neural network model for social bot detection based on user profile data. Soc. Netw. Anal. Min. 12(1): 43 (2022) - [c13]Eiman Alothali, Kadhim Hayawi, Hany Alashwal:
Using Self-labeling and Co-Training to Enhance Bots Labeling in Twitter. AICCSA 2022: 1-2 - [c12]Sakib Shahriar, Rozita Dara, Kadhim Hayawi:
On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification. AICCSA 2022: 1-8 - [c11]Zouheir Trabelsi, Tariq Qayyum, Kadhim Hayawi, Muhammad Ali:
Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs). COINS 2022: 1-6 - [c10]Sakib Shahriar, Kadhim Hayawi:
NFTGAN: Non-Fungible Token Art Generation Using Generative Adversarial Networks. ICMLT 2022: 255-259 - 2021
- [j5]Tariq Qayyum, Zouheir Trabelsi, Asad Waqar Malik, Kadhim Hayawi:
Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities. IEEE Access 9: 21859-21869 (2021) - [j4]Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Pin-Han Ho:
D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems. IEEE Access 9: 137260-137280 (2021) - [j3]Eiman Alothali, Kadhim Hayawi, Hany Alashwal:
Hybrid feature selection approach to identify optimal features of profile metadata to detect social bots in Twitter. Soc. Netw. Anal. Min. 11(1): 84 (2021) - [c9]Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Temesgen Michael, Mai El Barachi:
Smart Online Exam Proctoring Assist for Cheating Detection. ADMA 2021: 118-132 - [c8]Eiman Alothali, Hany Alashwal, Motamen Salih, Kadhim Hayawi:
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka. CSNet 2021: 98-102 - [c7]Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Mohammad Mehedy Masud:
Blockchain-based Secure CIDS Operation. CSNet 2021: 103-106 - [c6]Ahmad Samer Wazan, Mohammad Amin Kuhail, Kadhim Hayawi, Rémi Venant:
Which Virtualization Technology is Right for My Online IT Educational Labs? EDUCON 2021: 1254-1261 - [i1]Sakib Shahriar, Kadhim Hayawi:
NFTGAN: Non-Fungible Token Art Generation Using Generative Adversarial Networks. CoRR abs/2112.10577 (2021) - 2020
- [j2]Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss. IEEE Access 8: 78029-78043 (2020) - [c5]Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, Muhsin Cheratta:
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data. ACSW 2020: 33:1-33:8 - [c4]Eiman Alothali, Kadhim Hayawi, Hany Al Ashwal:
Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study. ICWS 2020: 150-163
2010 – 2019
- 2019
- [j1]Zouheir Trabelsi, Safaa Zeidan, Kadhim Hayawi:
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack. IEEE Access 7: 61596-61609 (2019) - 2017
- [c3]Kadhim Hayawi, Pin-Han Ho, Sujith Samuel Mathew, Limei Peng:
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost. AINA 2017: 939-946 - 2015
- [c2]Kadhim Hayawi, Alireza Mortezaei, Mahesh V. Tripunitara:
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks. CODASPY 2015: 337-348
2000 – 2009
- 2006
- [c1]Ezedin Barka, Emad Eldin Mohamed, Kadhim Hayawi:
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices. IWCMC 2006: 1295-1300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint