Ahmed A. Abd El-Latif

Ahmed A. Abd El-Latif
Prince Sultan University · Computer Science

Professor
Vice chair of EIAS Lab, Founder and Deputy Director of the Center of Excellence in Quantum & Intelligent Computing

About

355
Publications
106,365
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,786
Citations
Introduction
Professor (Full) of Computer Science ; Editor ; author/co-author of more than 330 articles in reputed journals/conferences ; Head of Laboratory; Founder and Deputy Director of the Center of Excellence in Quantum & Intelligent Computing (PSU).

Publications

Publications (355)
Book
Full-text available
In today's interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient care and optimize operations. However, this digital transformation presents significant challenges in guaranteeing the security and privacy of sensitive healthcare data. "Secure Health confronts these challenges head-on, offering...
Article
Full-text available
This article presents unique research on the application of machine learning techniques to enhance the efficiency of antennas for wireless communication and Internet of Things (IoT) applications in the Terahertz (THz) fre quency band. This work utilizes Computer Simulation Technology (CST) Microwave Studio modelling techniques considering the compa...
Article
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve complex tasks through group cooperation. It comprises three main components: the end-user, the service provider, and the mobile user. The end-user requests crowd-sensing and computing services from the service provider, who handles task decomposition, distribution,...
Article
Full-text available
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown remarkable advancements, accurately identifying pedestrians and vehicles in adverse weather conditions remains a challenging task. Advers...
Article
Traditional discrete orthogonal transforms often introduce reconstruction errors, hindering their use in digital signal processing applications requiring exact signal recovery. To overcome this limitation, this paper presents the discrete integer Hahn transform (IHT), a novel discrete integer-based transform designed for lossless signal processing...
Article
Full-text available
Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system utilizes...
Preprint
Full-text available
Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system utilizes...
Conference Paper
Full-text available
This paper offers a novel deep learning (DL)-powered Tiny machinelearning (TinyML) model meticulously customized to recognize Arabic hand ges-tures (AHGs) executed in mid-air. The principal focus of this study lies in theintricate task of precisely classifying Arabic letters through these gestures. Thepaper provides a comprehensive exposition of th...
Article
Full-text available
Digital watermarking of images is an essential method for copyright protection and image security. This paper presents an innovative, robust watermarking system for color images based on moment and wavelet transformations, algebraic decompositions, and chaotic systems. First, we extended classical Charlier moments to quaternary Charlier moments (QC...
Research Proposal
Full-text available
Tentative Table of Content: Section 1: Introduction and Foundations of TinyML Chapter 1: Introduction to TinyML: Concepts and Applications Chapter 2: Machine Learning on the Edge: TinyML for Edge Computing Chapter 3: Interfacing Sensors and Actuators in TinyML Systems Section 2: Sector-Specific Applications Chapter 4: The Role of TinyML in S...
Research Proposal
Full-text available
Recommended Topics: 1. Introduction to Large Language Models: Understanding Their Impact 2. Theoretical Foundations of Large Language Models 3. Training Large Language Models: Techniques and Best Practices 4. Fine-Tuning Large Language Models for Specific Applications 5. Applications of Large Language Models in Healthcare 6. Financial Industry Tra...
Article
Full-text available
The need for high-speed and secure image encryption has become increasingly critical in the digital age, driven by the rapid growth of digital data, the rapid advancement of internet technologies, and the limitations of traditional encryption algorithms. This paper addresses this need by proposing a novel high-speed and secure image encryption that...
Article
The discrete Charlier moment transform, while extensively utilized in image processing, is inherently lossy and non-integer reversible, making it unsuitable for lossless image applications. To address this, we propose the Integer Reversible Charlier Transform (IRCT), which operates on integer values and produces integer coefficients, enabling perfe...
Preprint
Full-text available
Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper presents an innovative approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system lever...
Article
Full-text available
Social media platforms serve as communication tools where users freely share information regardless of its accuracy. Propaganda on these platforms refers to the dissemination of biased or deceptive information aimed at influencing public opinion, encompassing various forms such as political campaigns, fake news, and conspiracy theories. This study...
Article
Full-text available
Cyclic quantum teleportation schemes requires at least the existence of three collaborators acting all as senders and receivers of quantum information, each one of them has an information to be transmitted to the next neighbour in a circular manner. Here, new cyclic quantum teleportation scheme is proposed for perfectly transmitting cyclically thre...
Article
Full-text available
Renewable energy sources play a critical role in all governments’ and organizations’ energy management and sustainability plans. The solar cell represents one such renewable energy resource, generating power in a population-free circumference. Integrating these renewable sources with the smart grids leads to the generation of green smart grids. Sma...
Article
Chaos systems find extensive applications in cryptography and pseudorandom number generation due to their ability to generate pseudo-random signals. This paper focuses on enhancing the complexity of chaotic systems by introducing the memristor, a nonlinear component. We propose a novel map called the 2D memristive Cubic map (2D-MCM), which integrat...
Book
Embark on an exploration of the challenges posed by the convergence of artificial intelligence (AI) and multimedia data processing. In the landscape of technology, the relationship between AI and multimedia unfolds with unprecedented innovation, accompanied by formidable ethical concerns and data management complexities. As society immerses itself...
Preprint
Full-text available
Cyclic quantum teleportation schemes requires at least the existence of three collaborators acting all as senders and receivers of quantum information, each one of them has an information to be transmitted to the next neighbour in a circular manner. Here, new cyclic quantum teleportation scheme is proposed for perfectly transmitting cyclically thre...
Article
Full-text available
Heart disease (HD) stands as a major global health challenge, being a predominant cause of death and demanding intricate and costly detection methods. The widespread impact of heart failure, contributing to increased rates of morbidity and mortality, underscores the urgency for accurate and timely prediction and diagnosis. This is crucial for effec...
Article
With the rapid progress of communication technology, the Internet of Things (IoT) has emerged as an essential element in our daily lives. Given that the IoT encompasses diverse devices that often have limited resources in terms of communication , computation, and storage. Consequently, the National Institute of Standards and Technology (NIST) has s...
Article
Full-text available
Natural disasters can be unpredictable and catastrophic. Even after the event, the repercussions are prolonged due to the incompetence of disaster management strategies. To mitigate the effects of a natural hazard, disaster management teams have to rapidly come forth with innovative plans of action. To contain the damage that a disaster causes, the...
Chapter
There is increasing demand for Internet of Things (IoT) devices in many aspects of life such as healthcare, transportation, agriculture, and industry generating huge amounts of data. On the other hand, big data analysis plays an important role in today’s emerging world. The manufacturing of IoT plays a significant role in the manufacturing industry...
Chapter
Software-defined network (SDN) makes today’s networks programmable and provides several benefits such as global awareness, centralized management, and network abstraction. SDN is an innovative paradigm that enables the development of new and more efficient security services. This chapter provides an overview of the software-defined networking parad...
Article
Mobile edge computing (MEC), located at the networks edge, enhances distributed computing. However, its fixed position presents limitations during emergencies. Integrating unmanned aerial vehicles (UAVs) into MEC systems offers a solution but introduces challenges in managing UAV collaboration. This paper proposes a Reinforcement Deep Q-Learning ba...
Article
Full-text available
Deep convolutional neural networks (DCNNs) have emerged as powerful tools in diverse remote sensing domains, but their optimization remains challenging due to their complex nature and the large number of parameters involved. Researchers have been exploring more sophisticated methodologies to improve image classification accuracy. In this paper, we...
Article
Full-text available
Transfer learning (TL) has emerged as a promising area of research in machine learning (ML) due to its ability to enhance learning efficiency and accuracy by leveraging knowledge from related domains. However, traditional TL is limited in its applicability to real-world scenarios where the assumption of identical feature spaces and distributions be...
Article
Full-text available
Automated communication within heterogeneous connectivity of participating devices is an exceptional idea that has allowed the world to take modernized network communication for granted. Internet-of-Things (IoT) is a cutting-edge technology that has enduringly adopted this phenomenal trend and proven its efficiency by facilitating every aspect of h...
Article
With the rapid development of the smart warehouse domain, there is a growing need for data privacy protection and accurate decision-making. This urgent need promotes the wide application of federated learning architectures in this field. The federated learning architecture has received attention for its significant advances in protecting users’ pri...
Article
Full-text available
The Internet of Things (IoT) has emerged as a revolutionary communication technology, enabling the connection of resource-limited devices to the Internet. These devices are deployed in various industrial control systems to remotely monitor and control industrial applications. However, the public Internet's inherent vulnerability to malicious attack...
Article
Full-text available
A hyperjerk system pertains to a dynamical system regulated by an ordinary differential equation of nth order, where n ≥ 4. The main contribution of this work is the finding of a new autonomous hyperjerk system with a half line equilibrium. The mathematical framework of the proposed hyperjerk system contains eight terms with an absolute function...
Article
Full-text available
Motivated by the critical need for securing bio-signal transmissions in resource-constrained Internet of Medical Things (IoMT) devices, this paper proposes a novel lightweight cryptosystem based on a newly developed chaotic map called the Logistic-Coupled Memristor (LCM) map. This map is designed by coupling a discrete memristor with the well-known...
Article
Full-text available
In recent years, the proliferation of online communication platforms and social media has given rise to a new wave of challenges, including the rapid spread of malicious bots. These bots, often programmed to impersonate human users, can infiltrate online communities, disseminate misinformation, and engage in various activities detrimental to the in...
Article
Full-text available
Biometric authentication technologies, which use physiological and behavioral traits to verify identity, have added a new layer of protection. However, concerns about privacy, security, and illegal entry persist. Therefore, multibiometric systems have emerged to improve authentication accuracy and system robustness. However, to address these proble...
Article
Vehicle-to-Infrastructure (V2I) and Vehicle-to Vehicle (V2V) communications play crucial roles in Vehicular Ad Hoc Networks (VANETs), enabling real-time data exchange and enhancing road safety. These communication methods necessitate robust authenticated key exchange (AKE) mechanisms to protect user privacy and prevent unauthorized access. Recent r...
Article
The development of emerging consumer technologies such as the Internet of Things (IoT), artificial intelligence (AI), and cloud computing brings convenience but also raises critical concerns about securing communication data. Quantum computing threatens the security of classical public key cryptography, making post-quantum data protection essential...
Article
Deep learning techniques are increasingly adept at distinguishing between human-written and AI-generated text. This study presents a deep learning-based text classification system to discern the source of text—whether it’s generated by AI or authored by a human. We compiled a comprehensive and diverse dataset incorporating existing datasets, real-t...
Article
Full-text available
In this work, we utilize the advantages of quantum walk to design three authenticated quantum cryptographic protocols to establish secure channels for data transmission between sensor nodes: the first one is authenticated quantum key distribution (AQKD), the second one is authenticated semi-quantum key distribution (ASQKD) with one of the two parti...
Chapter
Internet of Things devices (IoTDs) connect a huge number of physical objects in order to provide services to users. However, due to the limitation of IoTDs, applications which are latency-sensitive and require huge computation resources are critical for them to be served, such as online gaming and augmented reality. To support such applications, ed...
Article
Full-text available
The concept of smart cities, which aim to enhance the quality of urban life through innovative technologies and policies, has gained significant momentum in recent years. As we approach the era of next-generation smart cities, it becomes crucial to explore the key enabling technologies that will shape their development. This work reviews the leadin...
Article
Full-text available
Cognitive radio enabled internet of things (CR-IoT) can potentially revolutionize the existing networking paradigm by enabling heterogeneous IoT users to communicate socially like friends using the existing limited spectrum. However, satisfying the varying requirements of heterogeneous users in CR-IoT remains a key challenge. Therefore, we propose...
Article
Color face images are often transmitted over public channels, where they are vulnerable to tampering attacks. To address this problem, the present paper introduces a novel scheme called Authentication and Color Face Self-Recovery (AuCFSR) for ensuring the authenticity of color face images and recovering the tampered areas in these images. AuCFSR us...
Article
Full-text available
The security and confidentiality of medical images are of utmost importance due to frequent issues such as leakage, theft, and tampering during transmission and storage, which seriously impact patient privacy. Traditional encryption techniques applied to entire images have proven to be ineffective in guaranteeing timely encryption and preserving th...
Article
Full-text available
The field of scene recognition, which lies at the crossroads of computer vision and artificial intelligence, has experienced notable progress because of scholarly pursuits. This article introduces a novel methodology for scene recognition by combining convolutional neural networks (CNNs) with feature selection techniques based on mutual information...
Book
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify in...
Chapter
Full-text available
This book chapter is a vital guide for understanding today's complex landscape of booming multimedia data and growing cybersecurity risks. It focuses on the transformative roles of natural language processing (NLP) and deep learning in both areas. The chapter starts by discussing deep learning's capabilities in multimedia data analysis before movin...
Article
Full-text available
Heart disease (HD) is a major threat to human health, and the medical field generates vast amounts of data that doctors struggle to effectively interpret and use. Early prediction and classification of HD types are crucial for effective medical treatment. Researchers have found it important to use learning-based techniques from machine and deep lea...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology that has recently gained significant interest, especially with the dramatic increase in connected devices. However, IoT networks are not yet standardized, and the design of such networks faces many challenges, including scalability, flexibility, reliability, and availability of such networks. R...
Article
Full-text available
The rapid growth of Internet of Things (IoT) devices and the increasing need for low-latency and high-throughput applications have led to the introduction of distributed edge computing. Flying fog computing is a promising solution that can be used to assist IoT networks. It leverages drones with computing capabilities (e.g., fog nodes), enabling da...
Chapter
The use of 1D chaotic maps in multimedia security applications is becoming increasingly attractive due to their advantages, including the high sensitivity to both initial and control parameters, rich dynamical behavior and ease of implementation for both software and hardware. This chapter presents a survey and analysis of recent multimedia encrypt...
Article
Full-text available
Depression is a serious mental health condition that affects a person’s ability to feel happy and engaged in activities. The COVID-19 pandemic has led to an increase in depression due to factors such as isolation, financial stress, and uncertainty about the future. Additionally, restrictions on travel and socializing have contributed to feelings of...
Article
Full-text available
To avoid rounding errors associated with the limited representation of significant digits when applying the floating-point Krawtchouk transform in image processing, we present an integer and reversible version of the Krawtchouk transform (IRKT). This proposed IRKT generates integer-valued coefficients within the Krawtchouk domain, seamlessly aligni...
Article
Full-text available
Image coding in quantum computing primarily focuses on encoding position and color information. This study introduces an enhanced quantum image representation by employing entanglement state encoding within the HSI color model. The proposed model employs a 2-qubit entanglement state to encode the H (hue) and S (saturation) channels. This approach s...
Article
Full-text available
Healthcare 4.0 is a recent e-health paradigm associated with the concept of Industry 4.0. It provides approaches to achieving precision medicine that delivers healthcare services based on the patient’s characteristics. Moreover, Healthcare 4.0 enables telemedicine, including telesurgery, early predictions, and diagnosis of diseases. This represents...
Article
The discrete Shmaliy moment transform (DST) is a type of discrete orthogonal moment transform that is widely used in signal and image processing. However, DST is not suitable for lossless image applications due to its non-integer reversible nature. To overcome this limitation, we introduce the integer discrete Shmaliy transform (IDST) that performs...
Article
Full-text available
This study presents an enhanced deep learning approach for the accurate detection of eczema and psoriasis skin conditions. Eczema and psoriasis are significant public health concerns that profoundly impact individuals’ quality of life. Early detection and diagnosis play a crucial role in improving treatment outcomes and reducing healthcare costs. L...
Article
Full-text available
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security. This paper proposes to present a modified SHA-256 like hash algorithm by exploring the design principles of the two hash schemes (SHA-25...
Article
Full-text available
In recent times, there has been a noticeable increase in the application of human biometrics for user authentication in various domains, such as online banking. However, the use of biometric systems poses security risks and the potential for misuse, primarily due to the storage of original templates in databases. To tackle this issue, the concept o...
Article
Full-text available
The blind quantum computation (BQC) protocol allows for privacy-preserving remote quantum computations. In this paper, we introduce a remote quantum error correction code preparation protocol for BQC using a cluster state and analyze its blindness in the measurement-based quantum computation model. Our protocol requires fewer quantum resources than...