Wajdi Alhakami
Taif University
H-index: 20
Asia-Saudi Arabia
Top articles of Wajdi Alhakami
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model | Applied Computing and Informatics | Abdullah Alharbi Wajdi Alhakami Sami Bourouis Fatma Najar Nizar Bouguila | 2024/1/5 |
Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method | Processes | Wajdi Alhakami | 2023/4/29 |
TVUB: Thermal Vision-based UAV and Blockchain-aided Poaching Prevention System | Sudha Anbalagan Wajdi Alhakami Abhishek Manoharan Anushka Nehra Hosam Alhakami | 2023/12/4 | |
Reliable and secure X2V energy trading framework for highly dynamic connected electric vehicles | IEEE Transactions on Vehicular Technology | Mawloud Omar Abdullah Baz Hosam Alhakami Wajdi Alhakami | 2023/3/2 |
Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia | Sustainability | Hosam Alhakami Tahani Alsubait Wajdi Alhakami Hatim Alhakami Rushdi Alhakami | 2023/11/9 |
A lightweight authentication mac protocol for cr-wsns | Sensors | Bashayer Othman Aloufi Wajdi Alhakami | 2023/2/10 |
A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System | Sensors | Muhammad Asghar Khan Hosam Alhakami Wajdi Alhakami Alexey V Shvetsov Insaf Ullah | 2023/6/7 |
SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising | Expert Systems | Poongodi Manoharan Ranjan Walia Celestine Iwendi Tariq Ahamed Ahanger ST Suganthi | 2023/6 |
A resource-friendly certificateless proxy signcryption scheme for drones in networks beyond 5G | MA Khan H Alhakami I Ullah W Alhakami SAH Mohsan | 2023 | |
Evaluating intelligent methods for detecting covid-19 fake news on social media platforms | Electronics | Hosam Alhakami Wajdi Alhakami Abdullah Baz Mohd Faizan Mohd Waris Khan | 2022/8/3 |
A secure LEACH-PRO protocol based on blockchain | Sensors | Ghada Sultan Aljumaie Wajdi Alhakami | 2022/11/2 |
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography (vol 102, 108205, 2022) | Computers and Electrical Engineering | Manjari Singh Rathore M Poongodi Praneet Saurabh Umesh Kumar Lilhore Sami Bourouis | 2022/9/1 |
The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT-based security attacks | Muhammad Shafiq Zhaoquan Gu Omar Cheikhrouhou Wajdi Alhakami Habib Hamam | 2022/8/3 | |
An Effective Secure MAC Protocol for Cognitive Radio Networks. | Comput. Syst. Sci. Eng. | Bayan Al-Amri Gofran Sami Wajdi Alhakami | 2022/1/1 |
Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 108205 | Computers and Electrical Engineering | Manjari Singh Rathore M Poongodi Praneet Saurabh Umesh Kumar Lilhore Sami Bourouis | 2022/10 |
A Real-time Privacy System for Electric Vehicles using Blockchain Technology | Samuel Omaji Ijegwa David Acheme Ayodeji Samuel Makinde Blessing Omojo Akogwu Adamu Sani Yahaya | 2022/11/1 | |
A novel secured multi-access edge computing based vanet with neuro fuzzy systems based blockchain framework | Computer Communications | M Poongodi Sami Bourouis Ahmed Najat Ahmed M Vijayaragavan KGS Venkatesan | 2022/8/1 |
A machine learning strategy for the quantitative analysis of the global warming impact on marine ecosystems | Symmetry | Hosam Alhakami Mustafa Kamal Muhammad Sulaiman Wajdi Alhakami Abdullah Baz | 2022/9/26 |
Adaptive control-based Isolated bi-directional converter for G2V& V2G charging with integration of the renewable energy source | Energy Reports | Srinivas Singirikonda Yeddula Pedda Obulesu Ramani Kannan K Jyotheeswara Reddy G Kiran Kumar | 2022/11/1 |
A new V-net convolutional neural network based on four-dimensional hyperchaotic system for medical image encryption | Security and Communication Networks | Xiaowei Wang Shoulin Yin Muhammad Shafiq Asif Ali Laghari Shahid Karim | 2022/2/14 |