Computation offloading in the edge-to-cloud compute continuum: a survey of federated architectural solutions
Journal Article
Pournazari, J., Ullah, A., Al-Dubai, A., & Liu, X. (in press)
Computation offloading in the edge-to-cloud compute continuum: a survey of federated architectural solutions. Cluster Computing, https://doi.org/10.1007/s10586-025-05577-6
Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks
Presentation / Conference Contribution
Yigit, Y., Gursu, K., Al-Dubai, A., Maglaras, L. A., & Canberk, B. (2025, March)
Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks. Presented at IEEE Wireless Communications and Networking Conference (WCNC), Milan, Italy
With the development of software-defined edge networks, network management has become more flexible and realtime. However, this advancement has also led to critical security c...
Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies
Journal Article
Aljalaoud, H., Dashtipour, K., & AI_Dubai, A. (2025)
Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies. IEEE Access, 13, 69021-69038. https://doi.org/10.1109/access.2025.3561132
The freedom of speech in online spaces has substantially promoted engagement on social media platforms, where cyberbullying has emerged as a significant consequence. While ext...
Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events
Journal Article
Basabain, S., Al‐Dubai, A., Cambria, E., Alomar, K., & Hussain, A. (2025)
Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events. Expert Systems, 42(5), Article e70030. https://doi.org/10.1111/exsy.70030
The focus of this study is to present the detailed process of collecting a dataset of Arabic short-text in the tourism context and annotating this dataset for the task of sent...
Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges
Journal Article
Abdel Aziz, S., Wang, X., Hawbani, A., Qureshi, . B., Alsamhi, S. H., Alabsi, A., Zhao, L., Al-Dubai, A., & Ismail, . A. (online)
Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2025.3549414
Recently, a plethora of promising green energy provisioning technologies has been discussed in the orientation of prolonging the lifetime of energy-limited devices (e.g., sens...
Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin
Presentation / Conference Contribution
Al-Shareeda, S., Celik, Y., Bilgili, B., Al-Dubai, A., & Canberk, B. (2025, February)
Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin. Presented at 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM), Byblos, Lebanon
Creating a Digital Twin (DT) for Healthcare Intelligent Transportation Systems (HITS) is a hot research trend focusing on enhancing HITS management, particularly in emergencie...
Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations
Presentation / Conference Contribution
Almaini, A., Koßmann, T., Folz, J., Schramm, M., Heigl, M., & Al-Dubai, A. (2024, June)
Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations. Presented at UNet24: The International Conference on Ubiquitous Networking, Marrakesh, Morocco
Recent advancements in Software-Defined Networking (SDN) have facilitated its deployment across diverse network types, including edge networks. Given the broad applicability o...
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September)
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain
With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseu...
CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems
Journal Article
Zhao, L., Mao, C., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2025)
CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems. IEEE Transactions on Mobile Computing, 24(3), 2331-2345. https://doi.org/10.1109/tmc.2024.3492148
As a promising vehicular communication technology, Cellular Vehicle-to-Everything (C-V2X) is expected to ensure the safety and convenience of Intelligent Transportation System...
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July)
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. ...