Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 171 matches
- 2024
- Muhammad Jamal Shehab, Mohamed Elsayed, Abdullateef Almohamad, Ahmed Badawy, Tamer Khattab, Nizar Zorba, Mazen O. Hasna, Daniele Trinchero:
Terahertz Multiple Access: A Deep Reinforcement Learning Controlled Multihop IRS Topology. IEEE Open J. Commun. Soc. 5: 1072-1087 (2024) - Tarek M. Mostafa, Guang Ooi, Mehmet Burak Ozakin, Moutazbellah Khater, Mohamed Larbi Zeghlache, Hakan Bagci, Shehab Ahmed:
An Innovative Pipe Inspection Tool Utilizing Electromagnetic Resonance Coupling and Machine Learning. IEEE Trans. Ind. Electron. 71(5): 5338-5348 (2024) - Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Mohamed Shehab:
Replication: What Would Motivate Users to Use Gmail's Confidential Mode? HICSS 2024: 7645-7654 - Mohamed el Shehaby, Aditya Kotha, Ashraf Matrawy:
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness. CoRR abs/2403.10461 (2024) - 2023
- Shehab Khan Noor, Arif Mawardi Ismail, Mohd Najib Mohd Yasin, Mohamed Nasrun Osman, Thennarasan Sabapathy, Shakhirul Mat Salleh, Ping Jack Soh, Ali Hanafiah Rambe, Nurulazlina Ramli:
Higher Order OAM Mode Generation Using Wearable Antenna for 5G NR Bands. Comput. Syst. Sci. Eng. 47(1): 537-551 (2023) - Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo, Mohamed Shehab:
Managing Access to Confidential Documents: A Case Study of an Email Security Tool. Future Internet 15(11): 356 (2023) - Abdulaziz Shehab, Ahmed Elashry, Ahmed Aboul-Fotouh, Alaa Mohamed Riad:
An Enhanced Partitioning Approach in SpatialHadoop for Handling Big Spatial Data. Int. J. Comput. Intell. Syst. 16(1): 15 (2023) - Yuchen Xie, Shehab Mohamed Beram, Baljinder Kaur, Rahul Neware, Manik Rakhra, Deepika Koundal:
Research on Visualization of Large-scale User Association Feature Data Based on Nonlinear Dimension Reduction Method. J. Mobile Multimedia 19(2): 587-602 (2023) - Shweta Chauhan, Jayashree Premkumar Shet, Shehab Mohamed Beram, Vishal Jagota, Mohammed Dighriri, Mohd Wazih Ahmad, Md Shamim Hossain, Ali Rizwan:
Rule Based Fuzzy Computing Approach on Self-Supervised Sentiment Polarity Classification with Word Sense Disambiguation in Machine Translation for Hindi Language. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(5): 153:1-153:21 (2023) - Ashima Kukkar, Dinesh Gupta, Shehab Mohamed Beram, Mukesh Soni, Nikhil Kumar Singh, Ashutosh Sharma, Rahul Neware, Mohammad Shabaz, Ali Rizwan:
Optimizing Deep Learning Model Parameters Using Socially Implemented IoMT Systems for Diabetic Retinopathy Classification Problem. IEEE Trans. Comput. Soc. Syst. 10(4): 1654-1665 (2023) - Mohamed el Shehaby, Ashraf Matrawy:
The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster). CNS 2023: 1-2 - Lipsarani Sahoo, Mohamed Shehab:
I Have No Idea What Are These Terms! Exploring Users' Understanding and Interpretation of Genealogy Results. HCI (45) 2023: 141-148 - Shehab Eldeen Ayman Mounir, Samir Abou El-Seoud, Khaled Nagaty, Omar H. Karam:
The Influence of ChatGPT on Student Learning and Academic Performance. ICCA 2023: 1-5 - Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mohamed Alashhab, Shehabuldin Alashhab:
Online Machine Learning Approach to Detect and Mitigate Low-Rate DDoS Attacks in SDN-Based Networks. IICAIET 2023: 152-157 - Muhammad Jamal Shehab, Ahmed Badawy, Mohamed Elsayed, Tamer Khattab, Daniele Trinchero:
DDPG Performance in THz Communications over Cascaded RISs: A Machine Learning Solution to the Over-Determined System. IWCMC 2023: 210-215 - Shehab Alsanwy, Houshyar Asadi, Mohammad Reza Chalak Qazani, Shady M. K. Mohamed, Saeid Nahavandi:
A CNN-LSTM Based Model to Predict Trajectory of Human-Driven Vehicle. SMC 2023: 3097-3103 - Hussein Hazazi, Mohamed Shehab:
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User. SOUPS 2023: 559-577 - Mohamed Shehab, Maribel Fernández, Ninghui Li:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023. ACM 2023 [contents] - Muhammad Jamal Shehab, Abdullateef Almohamad, Mohamed Elsayed, Ahmed Badawy, Tamer Khattab, Nizar Zorba, Mazen O. Hasna, Daniele Trinchero:
Terahertz Multiple Access: A Deep Reinforcement Learning Controlled Multihop IRS Topology. CoRR abs/2303.09476 (2023) - Mohamed el Shehaby, Ashraf Matrawy:
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning. CoRR abs/2306.05494 (2023) - 2022
- Sherif M. Dabour, Majed AlOtaibi, Amr A. Abd-Elaziz, Mahmoud A. Alshahat, Mahmoud Abdallah, Ali Mohamed Eltamaly, Ayman S. Abdel-Khalik, Ahmed M. Massoud, Shehab Ahmed:
Modeling and Control of Single-Stage Quadratic-Boost Split Source Inverters. IEEE Access 10: 24162-24180 (2022) - Mohamed Y. Metwly, Ayman S. Abdel-Khalik, Mostafa S. Hamad, Shehab Ahmed, Noha A. Elmalhy:
Multiphase Stator Winding: New Perspectives, Advanced Topologies, and Futuristic Applications. IEEE Access 10: 103241-103263 (2022) - Shehab Khan Noor, Mohd Najib Mohd Yasin, Arif Mawardi Ismail, Mohamed Nasrun Osman, Ping Jack Soh, Nurulazlina Ramli, Ali Hanafiah Rambe:
A Review of Orbital Angular Momentum Vortex Waves for the Next Generation Wireless Communications. IEEE Access 10: 89465-89484 (2022) - Laith Abualigah, Mohamed Abd Elaziz, Putra Sumari, Ahmad M. Khasawneh, Mohammad Alshinwan, Seyedali Mirjalili, Mohammad Shehab, Hayfa Y. Abuaddous, Amir H. Gandomi:
Black hole algorithm: A comprehensive survey. Appl. Intell. 52(10): 11892-11915 (2022) - Soha A. Nossier, Mohamed R. M. Rizk, Saleh el Shehaby, Nancy Diaa Moussa:
Environmental Noise Adaptable Hearing Aid using Deep Learning. Int. Arab J. Inf. Technol. 19(5): 831-841 (2022) - Muhammad Jamal Shehab, Bekir Sait Ciftler, Tamer Khattab, Mohamed M. Abdallah, Daniele Trinchero:
Deep Reinforcement Learning Powered IRS-Assisted Downlink NOMA. IEEE Open J. Commun. Soc. 3: 729-739 (2022) - Elham Al Qahtani, Yousra Javed, Mohamed Shehab:
User Perceptions of Gmail's Confidential Mode. Proc. Priv. Enhancing Technol. 2022(1): 187-206 (2022) - Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Mohammed A. Shehab:
An Effective Approach for Parsing Large Log Files. ICSME 2022: 1-12 - Yasser M. Shabana, Dina Tarek, Sara Samir, Shehab A. Gaber, Shimaa M. Amer, Abdelrahman M. Shaban, Mohamed A. A. Ibrahim, M. O. Elfaramawy, M. O. M. Ibrahim, M. El Qassim, Nour M. Abdelhamid:
Enhancing the Performance of Biosensors Using Advanced Materials. NILES 2022: 151-154 - Elham Al Qahtani, Lipsarani Sahoo, Yousra Javed, Mohamed Shehab:
"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA. SACMAT 2022: 139-150
skipping 141 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 20:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint