Sherali Zeadally's research while affiliated with University of Kentucky and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (554)
Unmanned aerial vehicles (UAVs) are considered for disaster management to provide better coverage or help first responders provide advanced services. Furthermore, UAVs combined with mobile edge computing (MEC) capabilities, have recently emerged as a support for cloud computing by deploying UAV-assisted MEC at the network edge to reduce the latency...
Sensing technology has long been an integral part of modern developments that have brought several benefits to various domains ranging from civil and military to commercial and healthcare applications. However, the sensor’s inadequate energy is the primary concern that affects their long-term sustainable operations and remote location deployment. T...
The main challenges in sixth-generation (6G) communication networks are connection reliability, low transmission latency, massive low-powered connectivity, and ultra-high capacity. Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency...
In recent years, we have witnessed growing interest in using deep learning to detect misinformation. This increased attention is being driven by deep learning technologies’ ability to accurately detect this misinformation. However, there is a diverse array of content that can be considered misinformation, such as fake news and satire. Similarly, in...
The COVID-19 pandemic has exposed many organizational vulnerabilities to cyber threats, with ransomware being at the top of the list. These can be attributed mainly to consolidated accessibility as organizational vision to enable remote connectivity to their digital resources for maintaining uninterrupted and safe business operations. During the pe...
The recent pandemic of COVID-19 has proven to be a test case for Unmanned Aerial Vehicles (UAVs). UAVs have shown great potential for plenty of applications in the face of this pandemic, but their scope of applications becomes limited due to the dependency on ground pilots. Irrespective of the application, it is imperative to have an autonomous pat...
A wireless sensor network (WSN) is a network of tiny sensors deployed to collect data. These sensors are powered with batteries that have limited power. Recharging and/or replacement of these batteries, however, are not always feasible. Over the past few years, WSN applications are being deployed in diverse fields such as military, manufacturing, h...
Imagine stepping into a virtual world that's as rich, dynamic, and interactive as our physical one. This is the promise of the Metaverse, and it's being brought to life by the transformative power of Generative Artificial Intelligence (AI). This paper offers a comprehensive exploration of how generative AI technologies are shaping the Metaverse, tr...
Software application development is a complex activity which involves various actors and organizations in what is called the software supply chain. The evolution of the software supply chain led to numerous benefits such as profit maximization, code mutualization, and the optimization of lead times. However, the complexity of the software supply ch...
Space–air–ground–sea integrated (SAGSI) networks are envisioned to connect satellite, aerial, ground, and sea networks to provide connectivity everywhere and all the time in sixth-generation (6G) networks. However, the success of SAGSI networks is constrained by several challenges including resource optimization when the users have diverse requirem...
In a Distributed Denial of Service (DDoS) attack, a network of compromised devices is used to overwhelm
a target with a flood of requests, making it unable to serve legitimate requests. The detection of these attacks is a challenging issue in cybersecurity, which has been addressed using Machine Learning (ML) and
Deep Learning (DL) algorithms. Alth...
The rapid growth of Information Communication Technologies (ICT) has impacted many ields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every aspect of its end-to-end process. This evolution provides numerous beneits such as proit maximi...
Semantic communication is a new paradigm that exploits deep learning models to enable end-to-end communications processes, and recent studies have shown that it can achieve better noise resiliency compared with traditional communication schemes in a low signal-to-noise (SNR) regime. To achieve multiple access in semantic communication, we propose a...
Non Fungible Tokens (NFTs) are among the most promising technologies that have emerged in recent years. NFTs enable the efficient verification and ownership management of digital assets and therefore, offer the means to secure them. NFT is similar to blockchain that was first used by the cryptocurrency and then by numerous other technologies. At fi...
Metaverse is an evolving paradigm for the next-generation Internet, intends to provide 3D immersive experiences and self–sustaining virtual shared space by utilising a wide range of relevant technologies. Due to rapid advancement in technologies such as augmented reality (AR), mixed reality and virtual reality (VR) in real-time applications, metave...
Edge computing is a commonly used paradigm for providing low-latency computation services by locally deploying computation and storage resources close to the user equipments (UEs). Since the computation resource demand of the offloaded tasks of a UE is naturally a random variable, it is possible that the real-time computation capacity demand of a r...
Semantic communication is a new paradigm that exploits deep learning models to enable end-to-end (E2E) communications processes, and recent studies have shown that it can achieve better noise resiliency compared with traditional communication schemes in a low signal-to-noise (SNR) regime. To achieve multiple access in semantic communication, we pro...
Consumer electronics can support sixth-generation (6G) systems and their services, including ultra-reliable and low-latency communications (URLLC). In this context, unmanned aerial vehicles (UAVs) have become increasingly popular because they can: be dynamically positioned, take advantage of channel gains, and communicate directly via line-of-sight...
More than 6 billion smartphones available worldwide can enable governments and public health organizations to develop apps to manage global pandemics. However, hackers can take advantage of this opportunity to target the public in nefarious ways through malware disguised as pandemics-related apps. A recent analysis conducted during the COVID-19 pan...
Recent years have witnessed an increase in human life expectancy fueled by significant improvements in infrastructure, healthcare, and economies across the globe. Longer life spans have altered the world demographics resulting in a larger senior population compared with previous years. This trend has created the need for providing additional care a...
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
In recent years, the introduction of new technologies and applications connected to the Internet has demonstrated the physical incapacity of current optical backbone networks in providing resources soon. One of the main proposals to deal with this problem today is space-division multiplexing elastic optical networks. However, to transport the massi...
Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution...
Vehicular communication is one of the essential technologies for increasing road safety, traffic efficiency, and comfort for pedestrians and drivers. In this context, the internet of vehicles is an emerging paradigm. However, with advances in vehicular communication, security threats have also emerged. Several vulnerabilities exist in vehicular com...
Autonomous cars have become increasingly popular in the last decade because of their numerous benefits, such as lower travel time, increased safety, and improved fuel economy. Many car manufacturing companies and tech giants are working on this technology to make fully autonomous automobiles or strengthen their existing driver-less cars. These cars...
Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt...
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards have been adopted to regulate such networks. Within a C-ITS, a large number of messages are exchanged continuously i...
Smart agriculture integrates key information communication technologies with sensing technologies to provide effective and cost-efficient agricultural services. Smart agriculture leverages a wide range of advanced technologies, such as wireless sensor networks, Internet of things, robotics, agricultural bots, drones, artificial intelligence, and cl...
Classical edge computing algorithms assume that the execution time is always known in resource allocation. However, in practice, the execution time in the edge server is hard to estimate due to the complex environment, especially in Internet of Vehicles (IoV), which makes resource allocation a significant challenge. To address this problem, we prop...
We investigate how to provide Quality-of-Service (QoS) for diversified video flows. We design a fine-grained video traffic control mechanism that integrates traffic classification with path selection for video flows within the framework of SDN. For the design, we present a category-theoretic ontology log (olog) diagram model, which provides a novel...
In the context of new emerging infectious diseases, it is more secure for old patients to be confined to their homes while still having medical assistance. Most existing facilities use Radio Frequency (RF) devices to monitor and measure vital signs of a patient and send them to appropriate medical services. But this technology can have bad side eff...
Recently, the Internet of things (IoT) paradigm has proliferated all aspect of life. The improvements IoT has made in business and industry has raised the possibility of extending its use to underwater environments, which also impacts human life. Consequently, Internet of Underwater Things (IoUT) research is intensifying. As in IoT, to deploy a suc...
In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed...
Wearables today play a key role in E-Health computing , with investments expected to exceed $70 billion by 2024. With the massive use of apps on wearable devices, it is crucial to improve safety when using wearables, considering that important information about user information is stored on these devices. We present SOMEONE ensemble learning, a set...
Conventional data collection methods that use Wireless Sensor Networks (WSNs) suffer from disadvantages such as deployment location limitation, geographical distance, as well as high construction and deployment costs of WSNs. Recently, various efforts have been promoting mobile crowd-sensing (such as a community with people using mobile devices) as...
Unmanned Aerial Vehicles (UAVs) have seen a significant increase in their commercial application because of various technological breakthroughs. As UAVs are typically used in open environments for purposes such as military applications, surveillance, and delivery of commodities, they rely primarily on the visual signals recorded by the flying UAV....
Cellular vehicle-to-everything (V2X) communication is emerging as a feasible and cost-effective solution to support applications such as vehicle platooning, blind spot detection, parking assistance, and traffic management. To support these features, an increasing number of sensors are being deployed along the road in the form of roadside objects. H...
Excessive speed is the leading cause of accidents on highways. The use of fixed road-side surveillance systems has proven ineffective because people take caution around only those locations. With more advanced technologies and exceptional manoeuvring capabilities, Unmanned Aerial Vehicles (UAVs) is a promising candidate for real-time monitoring of...
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized the way we live and interact with each other as well as with various types of systems and devices which form part of the Information Communication Technology (ICT) infrastructure. IoT is having a significant impact on various application domains including h...
Digital twins, being the virtual replicas of their physical counterparts, share the expected functional requirements and operational behavior of the underlying systems. Due to this fact, digital twins may act as a potential source of data breaches. Attackers may exploit the valuable knowledge about the system accessible through digital twins to put...
There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The...
There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO 2 levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The in...
The advent of Blockchain and smart contracts is empowering many technologies and systems to automate commerce and facilitate the exchange, tracking and the provision of goods, data and services in a reliable and auditable way. Crowdsensing systems is one type of systems that have been receiving a lot of attention in the past few years. In crowdsens...
The introduction of sensor technology in our daily lives has brought comfort, convenience, and improved health over the past few decades. Technological advances further expanded the use of medical sensors by reducing their size and costs. Medical sensors improve the intelligence and capabilities of healthcare services including, remote health monit...
Long Range Wide Area Network (LoRaWAN) emerges to connect devices that require long-range and low-cost (bandwidth and power) communication services. In this context, the adoption of this technology brings new challenges due to the densification of IoT devices, which causes signal interference and affects the QoS directly. On the other hand, the LoR...
Edge computing is a recent trend wherein a (large) number of Internet of Things (IoT) devices are being connected to the cloud via edge devices. Although edge devices generally have (slightly) more computing power than IoT devices, several strategies can help to improve performance and reduce energy consumption. The key research challenge here is h...
Software defined networks (SDNs) have dramatically simplified network
management. However, enabling pure SDNs to respond in real-time while handling
massive amounts of data still remains a challenging task. In contrast, fog
computing has strong potential to serve large surges of data in real time. SDN
control plane enables innovation, and greatly s...
As the amount of data generated by scaled systems in Electronic Medical Records (EMRs) and the Industrial Internet of Things (IIoT) keeps increasing, third-party servers are essential for data storage and manipulation, and with them come privacy concerns. Encrypting the uploaded data strips the server’s ability to search over it for keywords: a hig...
Wireless Sensor Network (WSN) plays a vital role in dealing with the challenging tasks of information management in Intelligent Transportation Systems (ITS). Current research has shown that the ever growing number of vehicles on the roads is making congestion worse, and many safety concerns are being addressed comprehensively by the WSN-based ITS....
The path towards next-generation IoT is fundamentally characterized by artificial intelligence-based sensors. However, there are still some open issues, such as efficiency, accuracy, privacy, data trustworthiness, quality etc., that need to be addressed. Therefore, this special issue aims to solicit original papers to solve these issues. Finally, s...
Over the years, software applications have captured a big market ranging from smart devices (smartphones, smart wearable devices) to enterprise resource management including Enterprise Resource Planning, office applications, and the entertainment industry (video games and graphics design applications). Protecting the copyright of software applicati...
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Insecure cloud-native applications (CNAs) will continue to experience security compromises including data breaches due to their dynamic, complex, and varied threat landscape. We review current application security techniques, examine their benefits and shortcomings in the context of CNAs, and point out future research opportunities.
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health...
Various Distributed Ledger Technologies (DLTs), such as Blockchain, have evolved significantly in recent years. These technologies provide a robust and effective solution for providing confidentiality, integrity, non-repudiation, authentication and transparency. While Blockchain has many advantages, it has various limitations as well, such as compl...
Most IoT devices are battery powered and have limited power supplies. To ensure communication between two nodes, multi-hop transmissions over relays could be used. However, this communication cannot be achieved if the Signal-to-Noise Ratio (SNR) at the destination does not reach a reasonable threshold. Different relay selection approaches have been...
Unmanned aerial vehicles (UAVs) are widely used in various applications such as surveillance, healthcare, rescue, and crowdsensing. However, the network management of these applications is quite challenging given the mobility of UAVs. In this scenario, network softwarization, which decouples the hardware from the network control functions, becomes...
Advances in communications, smart transportation systems, and computer systems have recently opened up vast possibilities of intelligent solutions for traffic safety, convenience, and effectiveness. Artificial Intelligence (AI) is currently being used in various application domains because of its strong potential to help enhance conventional data-d...
Medical health insurance fraud has been a major concern for the healthcare industry and governmental institutions. In the United States, the health insurance companies recorded a loss of tens of billions yearly due to healthcare fraud. Some types of fraud are at the risk of the patient’s health. This is because the system that performs the manual p...
Fake check scam is one of the most common attacks used to commit fraud against consumers. This fraud is particularly costly for victims because they generally lose thousands of dollars as well as being exposed to judicial proceedings. Currently, there is no existing solution to authenticate checks and detect fake ones instantly. Instead, banks must...
Over the years, the healthcare industry has transformed from being hospital-centric to patient-centric. This shift is mainly due to the convergence of emergent technologies such as Internet-of-Things (IoT)-based healthcare, Fifth-Generation (5G) assisted networking, and data-driven analytics through Artificial Intelligence (AI). The convergence, te...
LoRaWAN is the most adopted communication technology for the Internet of Things (IoT) applications for enabling flexible, cost-effective long-range communication with low power consumption. The deployment of a wide range of IoT devices brings many benefits to many applications, but new challenges arise from the network point of view with this deplo...
Today, there is a crucial need for precise monitoring and prediction of energy consumption at the building level using the latest technologies including Internet of Things (IoT) and data analytics to determine and enhance energy usage. Data-driven models could be used for energy consumption prediction. However, due to high non-linearity between the...
Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user’s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve...
CALL FOR PAPER:
The workshop aims at bringing together scholars from academia and industry to discuss and present the latest research and findings on all the aspects of connectivity and interaction between moving objects/things.
I encourage you to consider submitting a paper and joining us next year if this interests you.
The COVID-19 pandemic has affected all parts of our daily lives, including the way we interact, work, educate, travel, conduct business, deliver healthcare services, and many other activities. COVID-19 has resulted in millions of deaths and severely impacted the economies of many nations worldwide. The significant global impact of the pandemic thro...
The Internet of Things (IoT) comprises physical/virtual networked objects that collect and exchange data with each other via the public Internet. As this exchange often takes place over public networks, many security attacks in an IoT environment are possible. First, we briefly review the security issues in the IoT environment. Next, we focus on re...
Software Defined Networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real-time. SDN control plane enables innovation, and greatly s...
Hash functions have always attracted a lot of attention in modern cryptography because of their hard to invert nature. However, all previous constructions of cryptographic primitives face the threat of being broken by the recent advancements in quantum technology. The focus has thus shifted to developing cryptographic primitives on mathematical str...
A major objective of vehicular networking is to improve road safety and reduce traffic congestion. The experience of individual vehicles on traffic conditions and travel situations can be shared with other vehicles for improving their route planning and driving decisions. Nevertheless, the frequent occurrence of adversary vehicles in the network ma...
Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are wi...
The ever-growing trend of making the traditional power grids smarter than before has resulted in their gradual evolution to more sophisticated grids, referred to as Smart Grids (SGs) Cyber-Physical Systems with complex networking technologies. The integration of Information and Communication Technologies with power grids fosters seamless data shari...
Intrabody Nanonetworks (IBN) are composed of nanosensors that have tremendous potential to enable cellular level monitoring and precision in drug delivery and diagnosis. Nanoscale communication using Electromagnetic (EM) waves propagation in the Terahertz (THz) band suffers from molecular absorption noise that has been regarded as the leading cause...
Fog computing is a promising technology that can provide storage and computational services to future 6G networks. To support the massive Internet of Things (IoT) applications in 6G, fog computing will play a vital role. IoT devices and fog nodes have energy limitations and hence, energy-efficient techniques are needed for storage and computation s...
The rapid growth of the Internet of Things (IoT) has accelerated strong interests in the development of low-power wireless sensors. Today, wireless sensors are integrated within IoT systems to gather information in a reliable and practical manner to monitor processes and control activities in areas such as transportation, energy, civil infrastructu...
The emergence of the fifth generation network (5G) has stimulated strong interest from academia and industry in enabling technologies such as vehicular networks. Despite the benefits of 5G, including ultra-low latency, flexibility, increased bandwidth, and scalability, 5G security is still a topic of debate to figure out whether it can fully suppor...
Intelligent Transportation Systems (ITS) help improve the ever‐increasing vehicular flow and traffic efficiency in urban traffic to reduce the number of accidents. The generation of massive amounts of data generated by all the digital devices connected to the transportation network enables the creation of datasets to perform an in‐depth analysis of...
Cloud computing is a network model of on-demand access for sharing configurable computing resource pools.
Compared with traditional services’ architectures, cloud computing introduces new security challenges in
secure service management and control, privacy protection, data integrity protection in distributed databases,
data backup, and synchroniza...
Recent advances in networking and mobile technologies such as 5G, long-term evolution (LTE), LiFi, wireless broadband (WiBro), WiFi-Direct, Bluetooth Low Energy (BLE) have paved the way for intelligent and smart services. With an average of more than 6.5 devices per person, a plethora of applications are being developed especially related to health...
The emergence of highly productive Cyber-Physical Manufacturing systems has motivated researchers to focus on minimizing communication overheads and saving computing resources. Traditional building virtual machine methods using the web-service and sensor techniques require a lot of system resources and incur high overheads, which make these techniq...