Ahmed A. Abd El-Latif

Ahmed A. Abd El-Latif
Prince Sultan University · Computer Science

Professor (Associate)
Vice chair of EIAS Lab, Founder and Deputy Director of the Center of Excellence in Quantum & Intelligent Computing

About

309
Publications
81,305
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,822
Citations
Introduction
Dr. Ahmed A. Abd El-Latif received the Ph.D. degree in Computer Science & Technology at Harbin Institute of Technology (H.I.T), Harbin, P. R. China in 2013. Dr. Abd El-Latif is currently an Associate Professor at the Faculty of Science, Menoufia University, Egypt. Collectively, Dr. Abd El-Latif authored about 100 International Journal articles, Conference Proceedings, and Book Chapters. Dr. Abd El-Latif received many awards, State Encouragement Award in Engineering Sciences 2016, Arab Republic of Egypt; the best Ph. D student award from Harbin Institute of Technology, China 2013; Young scientific award, Menoufia University, Egypt 2014. He is a fellow at Academy of Scientific Research and Technology, Egypt. For Research Collaborations: a.rahiem@gmail.com, AAbdelLatif@nu.edu.eg

Publications

Publications (309)
Article
Cognitive radio enabled internet of things (CR-IoT) can potentially revolutionize the existing networking paradigm by enabling heterogeneous IoT users to communicate socially like friends using the existing limited spectrum. However, satisfying the varying requirements of heterogeneous users in CR-IoT remains a key challenge. Therefore, we propose...
Article
In this work, we utilize the advantages of quantum walk to design three authenticated quantum cryptographic protocols to establish secure channels for data transmission between sensor nodes: the first one is authenticated quantum key distribution (AQKD), the second one is authenticated semi-quantum key distribution (ASQKD) with one of the two parti...
Article
Full-text available
Color face images are often transmitted over public channels, where they are vulnerable to tampering attacks. To address this problem, the present paper introduces a novel scheme called Authentication and Color Face Self-Recovery (AuCFSR) for ensuring the authenticity of color face images and recovering the tampered areas in these images. AuCFSR us...
Article
Full-text available
The security and confidentiality of medical images are of utmost importance due to frequent issues such as leakage, theft, and tampering during transmission and storage, which seriously impact patient privacy. Traditional encryption techniques applied to entire images have proven to be ineffective in guaranteeing timely encryption and preserving th...
Article
Full-text available
The field of scene recognition, which lies at the crossroads of computer vision and artificial intelligence, has experienced notable progress because of scholarly pursuits. This article introduces a novel methodology for scene recognition by combining convolutional neural networks (CNNs) with feature selection techniques based on mutual information...
Book
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify in...
Chapter
Full-text available
This book chapter is a vital guide for understanding today's complex landscape of booming multimedia data and growing cybersecurity risks. It focuses on the transformative roles of natural language processing (NLP) and deep learning in both areas. The chapter starts by discussing deep learning's capabilities in multimedia data analysis before movin...
Article
Full-text available
Heart disease (HD) is a major threat to human health, and the medical field generates vast amounts of data that doctors struggle to effectively interpret and use. Early prediction and classification of HD types are crucial for effective medical treatment. Researchers have found it important to use learning-based techniques from machine and deep lea...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology that has recently gained significant interest, especially with the dramatic increase in connected devices. However, IoT networks are not yet standardized, and the design of such networks faces many challenges, including scalability, flexibility, reliability, and availability of such networks. R...
Article
Full-text available
The rapid growth of Internet of Things (IoT) devices and the increasing need for low-latency and high-throughput applications have led to the introduction of distributed edge computing. Flying fog computing is a promising solution that can be used to assist IoT networks. It leverages drones with computing capabilities (e.g., fog nodes), enabling da...
Chapter
The use of 1D chaotic maps in multimedia security applications is becoming increasingly attractive due to their advantages, including the high sensitivity to both initial and control parameters, rich dynamical behavior and ease of implementation for both software and hardware. This chapter presents a survey and analysis of recent multimedia encrypt...
Article
Full-text available
Depression is a serious mental health condition that affects a person’s ability to feel happy and engaged in activities. The COVID-19 pandemic has led to an increase in depression due to factors such as isolation, financial stress, and uncertainty about the future. Additionally, restrictions on travel and socializing have contributed to feelings of...
Article
Full-text available
To avoid rounding errors associated with the limited representation of significant digits when applying the floating-point Krawtchouk transform in image processing, we present an integer and reversible version of the Krawtchouk transform (IRKT). This proposed IRKT generates integer-valued coefficients within the Krawtchouk domain, seamlessly aligni...
Article
Full-text available
Image coding in quantum computing primarily focuses on encoding position and color information. This study introduces an enhanced quantum image representation by employing entanglement state encoding within the HSI color model. The proposed model employs a 2-qubit entanglement state to encode the H (hue) and S (saturation) channels. This approach s...
Article
Full-text available
Healthcare 4.0 is a recent e-health paradigm associated with the concept of Industry 4.0. It provides approaches to achieving precision medicine that delivers healthcare services based on the patient’s characteristics. Moreover, Healthcare 4.0 enables telemedicine, including telesurgery, early predictions, and diagnosis of diseases. This represents...
Article
Full-text available
The discrete Shmaliy moment transform (DST) is a type of discrete orthogonal moment transform that is widely used in signal and image processing. However, DST is not suitable for lossless image applications due to its non-integer reversible nature. To overcome this limitation, we introduce the integer discrete Shmaliy transform (IDST) that performs...
Article
Full-text available
This study presents an enhanced deep learning approach for the accurate detection of eczema and psoriasis skin conditions. Eczema and psoriasis are significant public health concerns that profoundly impact individuals’ quality of life. Early detection and diagnosis play a crucial role in improving treatment outcomes and reducing healthcare costs. L...
Article
Full-text available
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security. This paper proposes to present a modified SHA-256 like hash algorithm by exploring the design principles of the two hash schemes (SHA-25...
Article
Full-text available
In recent times, there has been a noticeable increase in the application of human biometrics for user authentication in various domains, such as online banking. However, the use of biometric systems poses security risks and the potential for misuse, primarily due to the storage of original templates in databases. To tackle this issue, the concept o...
Article
Full-text available
The blind quantum computation (BQC) protocol allows for privacy-preserving remote quantum computations. In this paper, we introduce a remote quantum error correction code preparation protocol for BQC using a cluster state and analyze its blindness in the measurement-based quantum computation model. Our protocol requires fewer quantum resources than...
Article
Full-text available
This paper introduces a new chaotic jerk system with three cubic nonlinear terms. The stability properties of the three equilibrium points of the proposed jerk system are analyzed in detail. We show that the three equilibrium points of the new chaotic jerk system are unstable and deduce that the jerk system exhibits self-excited chaotic attractors....
Article
Full-text available
With the large-scale and pervading social media platforms and the recent advances in generative deep learning techniques, it is nowadays quite common to forge highly-realistic and credible misleading videos known as DeepFakes. These videos mean to alter the original intention behind the video to put forth their hidden ploys. In this work, a simple...
Article
Full-text available
Digital data plays a paramount part in various fields of life, in which multimedia data represent the majority of transferred digital data via communication networks. Consequently, cryptographers and researchers have paid attention to the security of multimedia. Chaotic models are utilised intensely with optimisation techniques for designing modern...
Article
Full-text available
In this paper an original EEG-fNIRS based hBCI system is devised by using the non-linear features mining and ensemble learning (EL) approach. We first diminish the noise and artifacts from the input EEG-fNIRS signals using digital filtering. After that, we use the signals for non-linear features mining. These features are “Fractal Dimension” (FD),...
Article
Full-text available
Simple Summary This paper discusses the importance of early detection of brain tumors and the limitations of traditional diagnosis methods. The use of deep learning models for brain tumor detection is introduced as a potential solution, but the high computing costs and potential biases in training data pose challenges. The study proposes a new, end...
Article
Full-text available
This article investigates a new autonomous mobile fog computing (MFC) system empowered by multiple unmanned aerial vehicles (UAVs) in order to serve medical Internet of Things devices (MIoTDs) efficiently. The aim of this article is to reduce the energy consumption of the UAVs-empowered MFC system by designing UAVs’ trajectories. To construct the t...
Article
Full-text available
This paper proposes a new image hashing method, which uses histogram reconstruction to solve the problem of the histogram not being sensitive to the change of pixel position, while ensuring the robustness of the hashing algorithm against common content preservation attacks (such as blurring, noise addition and rotation). The proposed algorithm can...
Article
Full-text available
Heart disease (HD) has become a dangerous problem and one of the most significant mortality factors worldwide, which requires an expensive and sophisticated detection process. Most people are affected due to the failure of the heart which seriously threatens their lives due to high morbidity and mortality. Therefore, accurate prediction and diagnos...
Article
Full-text available
In order to ensure reliable and secure image exchange, chaotic systems are often considered for their good performance in information security. In this work, we first propose an extended version of a chaotic tent map (TM)—the multiparametric 1D tent map (MTM). The latter contains six control parameters defined over an unlimited range. These paramet...
Article
Full-text available
Alzheimer’s disease (AD) is a neurodegenerative disorder characterized by cognitive impairment and aberrant protein deposition in the brain. Therefore, the early detection of AD is crucial for the development of effective treatments and interventions, as the disease is more responsive to treatment in its early stages. It is worth mentioning that de...
Article
Full-text available
In smart cities, target detection is one of the major issues in order to avoid traffic congestion. It is also one of the key topics for military, traffic, civilian, sports, and numerous other applications. In daily life, target detection is one of the challenging and serious tasks in traffic congestion due to various factors such as background moti...
Article
Full-text available
Software-Defined Networking (SDN) is a trending architecture that separates controller and forwarding planes. This improves network agility and efficiency. The proliferation of the Internet of Things devices has increased traffic flow volume and its heterogeneity in contemporary networks. Since SDN is a flow-driven network, it requires the correspo...
Article
Full-text available
Software-Defined Networking (SDN) is a trending architecture that separates controller and forwarding planes. This improves network agility and efficiency. The proliferation of the Internet of Things devices has increased traffic flow volume and its heterogeneity in contemporary networks. Since SDN is a flow-driven network, it requires the correspo...
Article
Software-Defined Networking (SDN) is a trending architecture that separates controller and forwarding planes. This improves network agility and efficiency. The proliferation of the Internet of Things devices has increased traffic flow volume and its heterogeneity in contemporary networks. Since SDN is a flow-driven network, it requires the correspo...
Article
Full-text available
Software-Defined Networking (SDN) is a trending architecture that separates controller and forwarding planes. This improves network agility and efficiency. The proliferation of the Internet of Things devices has increased traffic flow volume and its heterogeneity in contemporary networks. Since SDN is a flow-driven network, it requires the correspo...
Article
Full-text available
Citation: Yusuf, M.N.; Bakar, K.b.A.; Isyaku, B.; Osman, A.H.; Nasser, M.; Elhaj, F.A. Adaptive Path Selection Algorithm with Flow Classification for Software-Defined Networks. Abstract: Software-Defined Networking (SDN) is a trending architecture that separates controller and forwarding planes. This improves network agility and efficiency. The pro...
Article
Full-text available
This article presents a new network model for IoT that is based on a multi-story building structure. The model locates network nodes in a regular, cubic lattice-like structure, resulting in an equation for the signal-to-noise ratio (SNR). The study also determines the relationship between traffic density, network density, and SNR. In addition, the...
Article
Full-text available
TO remain competitive, every business requires useful information and knowledge. Identifying the target audience, understanding what consumers want, and anticipating their requirements are critical components of organizational management, decision-making, and planning processes. Appropriate data processing and analysis help firms attain these objec...
Article
To provide safe data communication, substitution boxes are employed in a variety of frameworks and cryptosystems. The acceptance of the AES encryption standard posed a challenge for security experts to develop sustainable substitution boxes utilizing various underlying techniques. It is because they are solely responsible to determine whether a cry...
Article
Full-text available
Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One of the recent research trends in this field is cancelable biometric template generation, which depends on the storage of a cipher (cancelable) template instead of the original biometric template. This trend ensures the confident...
Article
Full-text available
Augmented reality (AR) is a recent communication paradigm that is considered one of the primary functions of the fifth-generation cellular system (5G). AR is one of the ultra-reliable low latency communications since it requires a total delay of about 5 ms for AR applications. Since mobile devices are battery-operated and have many limitations in c...
Article
The Internet of Things (IoT) enabled technology will be adopted to develop smart cities, electronic commerce, electronic learning, electronic health, and other aspects of online activities. IoT enabled pervasive and wide connectivity to many objects and services. Therefore, it is easy to target IoT and cloud malware infection. Thus, cybersecurity i...
Article
Proton exchange membrane fuel cell (PEMFC) designs include multiple variable quantities with various nonlinear factors, which must be determined precisely to guarantee reliable modeling. The characteristic model of fuel cells (FCs) has an essential role in examining these cells' effective investigation. The FC design substantially influences simula...
Article
Butyrylcholinesterase (BChE) is a significant pharmaceutical drug for treating Alzheimer's disease (AD) . Thanks to the computational methods as which decreases significantly the overhead for screening BChE inhibitors. However, some of them have used one-hot encoding which ignores the sequential information. In this study, Term Frequency-Inverse Do...
Article
Full-text available
The negative effects caused by geometric distortion can be removed to the maximum extent possible through appropriate geometric transformations, allowing us to focus on the image content itself in subsequent processing and recognition. Therefore, geometric transformations are often used as a pre-processing step for other image processing applicatio...
Article
Full-text available
In this article, a new multicast protocol is introduced at the session layer, which is based on network coding and is called the Network Coding Datagram Protocol (NCDP). The NCDP protocol is specifically designed for content delivery systems that utilize multicast data transmission from multiple sources. The development of the NCDP packet and its o...
Article
Full-text available
In this paper, we propose a novel image cryptosystem that combines the adapted Particle Swarm Optimization (PSO) algorithm with a quantum-inspired Discrete-time Quantum Walk (DTQW). The proposed approach leverages the strengths of both PSO and DTQW, integrating them to achieve high security and efficiency in image encryption. The main contribution...
Article
The emergence of COVID-19 has led to a surge in fake news on social media, with toxic fake news having adverse effects on individuals, society, and governments. Detecting toxic fake news is crucial, but little prior research has been done in this area. This study aims to address this gap and identify toxic fake news to save time spent on examining...
Article
Full-text available
With the growing capability of realizing quantum computers, most medical image cryptosystems may crash. This work proposes a novel double medical-image encryption algorithm using quantum walks and logistic mapping. In the proposed encryption technique, the double plain images are split into two different images, one of which has the high 4 bits of...
Article
Full-text available
Specializing Directed Acyclic Graph Federated Learning (SDAGFL) is a new federated learning framework with the advantages of decentralization, personalization, resisting a single point of failure, and poisoning attack. Instead of training a single global model, the clients in SDAGFL update their models asynchronously from the devices with similar d...
Article
Full-text available
In recent years, autonomous vehicles have become more and more popular due to their broad influence over society, as they increase passenger safety and convenience, lower fuel consumption, reduce traffic blockage and accidents, save costs, and enhance reliability. However, autonomous vehicles suffer from some functionality errors which need to be m...
Article
Full-text available
Substitution-boxes are the main deciding components in symmetric-key cryptosystems for resisting many cryptanalytic attacks. It has been a challenging task for the designers to construct strong S-box which satisfies multiple cryptographic properties simultaneously. A number of S-box studies have been investigated in literature; but, the generated S...
Book
This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia.
Article
Full-text available
This paper presents a generalized approach to the performance analysis of relay-aided communication systems for 5G-and-beyond scenarios. A dual-hop decoding and forwarding scheme is considered in the analysis. The relationship between the outage performance and cumulative distribution function (CDF) of the signal-to-noise ratio (SNR) is exploited t...
Article
The evolution of 6TiSCH networks is greatly increasing in the field of IIoT which supports reliable communication in IIoT environments. However, there is a lot of research gaps in the field of IIoT using 6TiSCH networks in terms of high latency, more energy consumption which degrades the overall performance of the IIoT environment. To address the a...
Article
The application of convolutional neural networks (CNNs) to plant disease recognition is widely considered to enhance the effectiveness of such networks significantly. However, these models are nonlinear and have a high bias. To address the high bias of the single CNN model, the authors proposed an ensemble method of three lightweight CNNs models (M...
Article
The air transportation system has attracted due attention from researchers due to its fast expansion over the last decade. Past research has focused on air transportation networks (ATN), but this work considers the resilience of the air route network. This research work proposes a modified approach based on GRA-WSM, named MA (Modified Approach base...