title : Professor
College : Education for Pure Sciences
Department : Computer Science
Email : ayad.abdulsada@uobasrah.edu.iq
| Google Scholar: | https://scholar.google.com/citations?user=Ie7VGBQAAAAJ&hl=ar |
|---|---|
| Research Gate : | https://www.researchgate.net/profile/Ayad_Ibrahim3 |
| Web of Science : | https://publons.com/researcher/1686881/ayad-abdulsada/publications/ |
| Scopus : | https://www.scopus.com/authid/detail.uri?authorId=57198461574 |
| ORCID : | https://orcid.org/0000-0001-9625-4395 |
| Title of Search | Type | Publisher | year | Global | Single | Thompson Reuters (Clarivate) th> | Scopes | Download |
|---|---|---|---|---|---|---|---|---|
| Privacy Preserving Scheme for Document Similarity Detection | Journal | TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES | 2022 |
|
||||
| Privacy Preserving Image Matching Scheme with Aggregated Local Descriptors | Conference | IEEE | 2022 | |||||
| Privacy-Preserve Content-Based Image Retrieval Using Aggregated Local Features | Journal | IJEEE | 2022 |
|
||||
| Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges | Conference | Proc. of the International Conference on Electrical, Computer and Energy Technologies (ICECET) 9-10 December 2021, Cape Town-South Africa | 2022 | |||||
| Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping | Journal | IEEE | 2022 |
|
||||
| Lightweight, secure, similar -document retrieval over encrypted data | Journal | MDPI | 2021 |
|
||||
| Employee Attrition Prediction Using Deep Neural Networks | Journal | MDPI | 2021 |
|
||||
| Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data | Conference | IEEE | 2021 | |||||
| Security proof for backward searchable encryption scheme | Journal | Journal of Basrah Researches ((Sciences)) | 2021 | |||||
| Multi-keyword search over encrypted data with security proof | Journal | Journal of Basrah Researches ((Sciences)) | 2021 | |||||
| Efficient multi-keyword similarity search over encrypted cloud documents | Journal | Indonesian Journal of Electrical Engineering and Computer Science | 2021 | |||||
| Backward Private Searchable Symmetric Encryption with Improved Locality | Journal | Iraqi Journal for Electrical and Electronic Engineering | 2021 | |||||
| Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement | Journal | Iraqi Journal for Electrical and Electronic Engineering | 2021 | |||||
| SECURE SIMILAR DETECTION FOR DOCUMENTS | Journal | Journal of Basrah Researches ((Sciences)) | 2020 | |||||
| Towards efficient privacy-preserving image similarity detection | Conference | AIP Conference Proceedings | 2019 | |||||
| DNS Protection against Spoofing and Poisoning Attacks | Conference | Information Science and Control Engineering (ICISCE), 2016 3rd Interna | 2018 | |||||
| Efficient encrypted image retrieval in IoT-cloud with multi-user authentication | Journal | International Journal of Distributed Sensor Networks | 2018 | |||||
| Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing | Journal | Security and Communication Networks | 2017 | |||||
| Privacy preserving search over multiple servers | Journal | 426 Int. J. Autonomous and Adaptive Communications Systems, Vol. 10, N | 2017 | |||||
| Secure Image Retrieval over Untrusted Cloud Servers | Journal | International Journal of Engineering and Advanced Technology (IJEAT) ISSN | 2017 | |||||
| A secured scheme for geographical distance computation over encrypted | Conference | Signal Processing, Communications and Computing (ICSPCC), 2016 IEEE In | 2016 | |||||
| Secure biometric image retrieval in IoT-cloud | Conference | Signal Processing, Communications and Computing (ICSPCC), 2016 IEEE In | 2016 | |||||
| SEPIM: Secure and Efficient Private Image Matching | Journal | applied sceince | 2016 | |||||
| Towards Secure Private Image Matching | Conference | Green, Pervasive, and Cloud Computing | 2016 | |||||
| Enabling a Secure Match over Private Image Collections | Journal | Journal of Kufa for Mathematics and Computer Vol.3, No.2,pp 25-36 | 2016 |
|
||||
| Privacy-preserving Image Retrieval in IoT-Cloud | Journal | IEEE TrustCom/BigDataSE/ISPA | 2016 | |||||
| ARP Enhancement to Stateful Protocol by Registering ARP Request | Conference | International Conference on Network and Information Systems for Computers | 2016 | |||||
| Computing the shortest route among multiple points without revealing their geographical locations | Journal | Al-Qadisiyah University | 2015 |
|
||||
| Towards efficient yet privacy-preserving approximate search in cloud c | Journal | computer jo. | 2014 | |||||
| An suggested Algorithm For partial Encryption of Compressed Images | Journal | Journal of University of Thi-Qar Vol | 2014 |
|
||||
| secure image retrieval over untrusted cloud servers | Journal | IJEAT | 2014 | |||||
| Cloud authentication based on anonymous one-time password | Chapter | Ubiquitous Information Technologies and Applications | 2013 | |||||
| Encrypted remote user authentication scheme by using smart card | Journal | Web Information Systems and Mining | 2012 | |||||
| Efficient password-based two factors authentication in cloud computing | Journal | International Journal of Security and Its Applications | 2012 | |||||
| A practical privacy-preserving password authentication scheme for clou | Conference | Parallel and Distributed Processing Symposium Workshops & PhD Forum (I | 2012 | |||||
| Anonymous password authentication scheme by using digital signature an | Conference | Cloud and Green Computing (CGC), 2012 Second International Conference | 2012 | |||||
| Approximate keyword-based search over encrypted cloud data | Conference | e-Business Engineering (ICEBE), 2012 IEEE Ninth International Conferen | 2012 | |||||
| Secure rank-ordered search of multi-keyword trapdoor over encrypted cl | Journal | Services Computing Conference (APSCC), 2012 IEEE Asia-Pacific | 2012 | |||||
| A ROBUST WAVELET BASED WATERMARKING SCHEME FOR DIGITAL AUDIO | Journal | Iraqi Journal for Electrical & Electronic Engineering | 2012 | |||||
| A Secure Index for Document Similarity Detection | Journal | journal of karbala university | 2011 | |||||
| Hiding data using LSB-3 | Journal | J. Basrah Researches (Sciences) | 2007 |