title : Professor
College : Education for Pure Sciences
Department : Computer Science
Email : ayad.abdulsada@uobasrah.edu.iq
Google Scholar: | https://scholar.google.com/citations?user=Ie7VGBQAAAAJ&hl=ar |
---|---|
Research Gate : | https://www.researchgate.net/profile/Ayad_Ibrahim3 |
Web of Science : | https://publons.com/researcher/1686881/ayad-abdulsada/publications/ |
Scopus : | https://www.scopus.com/authid/detail.uri?authorId=57198461574 |
ORCID : | https://orcid.org/0000-0001-9625-4395 |
Title of Search | Type | Publisher | year | Global | Single | Thompson Reuters (Clarivate) th> | Scopes | Download |
---|---|---|---|---|---|---|---|---|
Privacy Preserving Scheme for Document Similarity Detection | Journal | TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES | 2022 | ![]() |
![]() |
![]() |
![]() |
|
Privacy Preserving Image Matching Scheme with Aggregated Local Descriptors | Conference | IEEE | 2022 | ![]() |
||||
Privacy-Preserve Content-Based Image Retrieval Using Aggregated Local Features | Journal | IJEEE | 2022 |
![]() |
||||
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges | Conference | Proc. of the International Conference on Electrical, Computer and Energy Technologies (ICECET) 9-10 December 2021, Cape Town-South Africa | 2022 | ![]() |
||||
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping | Journal | IEEE | 2022 | ![]() |
![]() |
![]() |
||
Lightweight, secure, similar -document retrieval over encrypted data | Journal | MDPI | 2021 | ![]() |
![]() |
![]() |
||
Employee Attrition Prediction Using Deep Neural Networks | Journal | MDPI | 2021 | ![]() |
![]() |
![]() |
![]() |
|
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data | Conference | IEEE | 2021 | ![]() |
||||
Security proof for backward searchable encryption scheme | Journal | Journal of Basrah Researches ((Sciences)) | 2021 | |||||
Multi-keyword search over encrypted data with security proof | Journal | Journal of Basrah Researches ((Sciences)) | 2021 | |||||
Efficient multi-keyword similarity search over encrypted cloud documents | Journal | Indonesian Journal of Electrical Engineering and Computer Science | 2021 | ![]() |
||||
Backward Private Searchable Symmetric Encryption with Improved Locality | Journal | Iraqi Journal for Electrical and Electronic Engineering | 2021 | |||||
Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement | Journal | Iraqi Journal for Electrical and Electronic Engineering | 2021 | |||||
SECURE SIMILAR DETECTION FOR DOCUMENTS | Journal | Journal of Basrah Researches ((Sciences)) | 2020 | |||||
Towards efficient privacy-preserving image similarity detection | Conference | AIP Conference Proceedings | 2019 | ![]() |
||||
DNS Protection against Spoofing and Poisoning Attacks | Conference | Information Science and Control Engineering (ICISCE), 2016 3rd Interna | 2018 | ![]() |
![]() |
|||
Efficient encrypted image retrieval in IoT-cloud with multi-user authentication | Journal | International Journal of Distributed Sensor Networks | 2018 | ![]() |
![]() |
|||
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing | Journal | Security and Communication Networks | 2017 | ![]() |
![]() |
|||
Privacy preserving search over multiple servers | Journal | 426 Int. J. Autonomous and Adaptive Communications Systems, Vol. 10, N | 2017 | ![]() |
![]() |
|||
Secure Image Retrieval over Untrusted Cloud Servers | Journal | International Journal of Engineering and Advanced Technology (IJEAT) ISSN | 2017 | ![]() |
||||
A secured scheme for geographical distance computation over encrypted | Conference | Signal Processing, Communications and Computing (ICSPCC), 2016 IEEE In | 2016 | ![]() |
![]() |
|||
Secure biometric image retrieval in IoT-cloud | Conference | Signal Processing, Communications and Computing (ICSPCC), 2016 IEEE In | 2016 | ![]() |
![]() |
|||
SEPIM: Secure and Efficient Private Image Matching | Journal | applied sceince | 2016 | ![]() |
![]() |
|||
Towards Secure Private Image Matching | Conference | Green, Pervasive, and Cloud Computing | 2016 | ![]() |
![]() |
|||
Enabling a Secure Match over Private Image Collections | Journal | Journal of Kufa for Mathematics and Computer Vol.3, No.2,pp 25-36 | 2016 |
![]() |
||||
Privacy-preserving Image Retrieval in IoT-Cloud | Journal | IEEE TrustCom/BigDataSE/ISPA | 2016 | ![]() |
![]() |
|||
ARP Enhancement to Stateful Protocol by Registering ARP Request | Conference | International Conference on Network and Information Systems for Computers | 2016 | ![]() |
||||
Computing the shortest route among multiple points without revealing their geographical locations | Journal | Al-Qadisiyah University | 2015 |
![]() |
||||
Towards efficient yet privacy-preserving approximate search in cloud c | Journal | computer jo. | 2014 | ![]() |
![]() |
|||
An suggested Algorithm For partial Encryption of Compressed Images | Journal | Journal of University of Thi-Qar Vol | 2014 | ![]() |
![]() |
|||
secure image retrieval over untrusted cloud servers | Journal | IJEAT | 2014 | ![]() |
||||
Cloud authentication based on anonymous one-time password | Chapter | Ubiquitous Information Technologies and Applications | 2013 | ![]() |
![]() |
|||
Encrypted remote user authentication scheme by using smart card | Journal | Web Information Systems and Mining | 2012 | ![]() |
![]() |
|||
Efficient password-based two factors authentication in cloud computing | Journal | International Journal of Security and Its Applications | 2012 | ![]() |
![]() |
|||
A practical privacy-preserving password authentication scheme for clou | Conference | Parallel and Distributed Processing Symposium Workshops & PhD Forum (I | 2012 | ![]() |
![]() |
|||
Anonymous password authentication scheme by using digital signature an | Conference | Cloud and Green Computing (CGC), 2012 Second International Conference | 2012 | ![]() |
![]() |
|||
Approximate keyword-based search over encrypted cloud data | Conference | e-Business Engineering (ICEBE), 2012 IEEE Ninth International Conferen | 2012 | ![]() |
![]() |
|||
Secure rank-ordered search of multi-keyword trapdoor over encrypted cl | Journal | Services Computing Conference (APSCC), 2012 IEEE Asia-Pacific | 2012 | ![]() |
![]() |
|||
A ROBUST WAVELET BASED WATERMARKING SCHEME FOR DIGITAL AUDIO | Journal | Iraqi Journal for Electrical & Electronic Engineering | 2012 | ![]() |
||||
A Secure Index for Document Similarity Detection | Journal | journal of karbala university | 2011 | ![]() |
||||
Hiding data using LSB-3 | Journal | J. Basrah Researches (Sciences) | 2007 | ![]() |