{"id":42,"date":"2020-09-24T12:38:28","date_gmt":"2020-09-24T12:38:28","guid":{"rendered":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/?page_id=42"},"modified":"2020-09-24T12:40:40","modified_gmt":"2020-09-24T12:40:40","slug":"recent-publications","status":"publish","type":"page","link":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/recent-publications\/","title":{"rendered":"Recent Journal Publications"},"content":{"rendered":"<ol>\n<li>Xue, W. Meng, H. Zhou, D. S. L. Wei, <strong>M. Guizani<\/strong>, \u201cA Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network,\u201d <em>IEEE Transactions on Wireless Communications<\/em>, Vol. 19, No. 6, 2020<\/li>\n<li>Zhao, H. Qin, B. Song, Y. Zhang, X. Du, <strong>M. Guizani<\/strong>, \u201cA Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G,\u201d <em>IEEE Transactions on Cognitive Communications and Networking<\/em>, Vol. 6, No. 2, 2020<\/li>\n<li>Yassine, S. Hossain, G. Muhammad, <strong>M. Guizani<\/strong>, \u201cCloudlet-based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing,\u201d <em>IEEE Transactions on Vehicular Technology<\/em>, Vol. 69, No. 5, 2020<\/li>\n<li>Liu, K. Xue, P. He, D. Wei, <strong>M. Guizani<\/strong>, \u201cAn Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in A Sharing Economy Environment,\u201d <em>IEEE Internet of Things Journal<\/em>, Vol. 7, No. 7, 2020<\/li>\n<li>Zhang, G. Han, <strong>M. Guizani<\/strong>, L. Yan, L. Shu, \u201cPeak Extraction Passive Source Localization using A Single Hydrophone in Shallow Water,\u201d <em>IEEE Transactions on Vehicular Technology<\/em>, Vol. 69, No. 3, 2020<\/li>\n<li>Hassija, V. Chamola, G. Han, J. Rodrigues, <strong>M. Guizani<\/strong>, \u201cDAGIoV: A Framework for Vehicle to Vehicle Communication using Directed Acyclic Graph and Game Theory,\u201d <em>IEEE Transactions on Vehicular Technology<\/em>, Vol. 69, No. 4, 2020<\/li>\n<li>Han, J. Du, C. Lin, H. Wu, <strong>M. Guizani<\/strong>, \u201cAn Energy-balanced Trust Cloud Migration Scheme for Underwater Acoustic Sensor Networks,\u201d <em>IEEE Transactions on Wireless Communications<\/em>, Vol. 19, No. 3, pp. 1636 \u2013 1649, 2020<\/li>\n<li>Shakeri, M. Al-Garadi, A. Badawy, A. Mohamed, T. Khattab, A. Al-Ali, K. Harras, <strong>M. Guizani<\/strong>, \u201cDesign Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions,\u201d <em>Communications Surveys &amp; Tutorials<\/em>, Vol. 21, Vol. 4, 2019<\/li>\n<li>Khattak, S. Islam, I. Ud Din, <strong>M. Guizani<\/strong>, \u201cIntegrating Fog Computing with VANETs: A Consumer Perspective,\u201d <em>IEEE Communications Standards Magazine<\/em>, Vol. 3, No. 1, 2019<\/li>\n<li>Zhang, H. Xu, X. Du, D. Zhou, <strong>M. Guizani<\/strong>, \u201cA Promising Non-Orthogonal Multiple Access Based Networking Architecture: Motivation, Conception, and Evolution,\u201d <em>IEEE Wireless Communications<\/em>, Vol. 26, No. 5, 2019<\/li>\n<li>Bi, G. Han, C. Lin, <strong>M. Guizani<\/strong>, X. Wang, \u201cMobility Management for Intro\/Inter Domain Handover in Software-Defined Networks,\u201d <em>IEEE JSAC<\/em>, Vol. 37, No. 8, 2019<\/li>\n<li>Su, T. He, Z. Fan, Y. Zhang, <strong>M. Guizani<\/strong>, \u201cAnswer Acquisition for Knowledge Base Question Answering Systems Based on Dynamic Memory Network,\u201d <em>IEEE Access<\/em>, Vol. PP, No. 99, <em><u>Early Access<\/u><\/em>, 2019<\/li>\n<li>He, H. Liu, S. Chan, <strong>M. Guizani<\/strong>, \u201cHow to Govern the Non-cooperative Amateur Drones?,\u201d <em>IEEE Network<\/em>, Vol. 33, No. 3, 2019<\/li>\n<li>Han, J. Wu, H. Wang, <strong>M. Guizani<\/strong>, J. Ansere, W. Zhang, \u201cA Multicharger Cooperative Energy Provision Algorithm Based on Density Clustering in the Industrial Internet of Things,\u201d <em>IEEE Internet of Things Journal<\/em>, Vol. 6, No. 5, 2019<\/li>\n<li>Zhen, H. Qin, Q. Zhang, Z. Chu, G. Lu, J. Jiang, <strong>M. Guizani<\/strong>, \u201cOptimal Preamble Design in Spatial Group-Based Random Access for Satellite-M2M Communications,\u201d <em>IEEE Wireless Communications Letters<\/em>, Vol. 8, No. 3, 2019<\/li>\n<li>Khattak, S. Islam, I. Din, <strong>M. Guizani<\/strong>, \u201cIntegrating Fog Computing with VANETs: A Consumer Perspective,\u201d <em>IEEE Communications Standards Magazine<\/em>, Vol. 3, No. 1, 2019<\/li>\n<li>Liu, H. Tang, R. Sun, X. Du, <strong>M. Guizani<\/strong>, \u201cLightweight and Privacy-Preserving Medical Services Access for Healthcare Cloud,\u201d <em>IEEE Access<\/em>, Vol. 7, 2019<\/li>\n<li>Nie, J. Luo, Z. Xiong, D. Niyato, P. Wang, <strong>M. Guizani<\/strong>, \u201cAn Incentive Mechanism Design for Socially Aware Crowdsensing Services with Incomplete Information,\u201d <em>IEEE<\/em> <em>Communications Magazine<\/em>, Vol. 57, No. 4, 2019<\/li>\n<li>Xia, E. Sifah, K. Agyekum, H. Xia, K. Acheampong, A. Smahi, J. Gao, X. Du, <strong>M. Guizani<\/strong>, \u201cSecured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments,\u201d <em>IEEE<\/em> <em>Internet of Things Journal<\/em>, Vol. 6, No. 6, 2019<\/li>\n<li>Xia, E. Sifah, K. Agyekum, H. Xia, K. Acheampong, A. Smahi, J. Gao, X. Du, <strong>M. Guizani<\/strong>, \u201cDetecting Promotion Attacks in the App Market Using Neural Networks,\u201d <em>IEEE<\/em> <em>Wireless Communications<\/em>, Vol. 26, No. 4, 2019<\/li>\n<li>Dai, M. Wang, Z. Gao, L. Huang, X. Du, <strong>M. Guizani<\/strong>, \u201cAn Adaptive Computation Offloading Mechanism for Mobile Health Applications,\u201d <em>IEEE Transactions on Vehicular Technology<\/em>, Vol. 68, No. 1, 2019<\/li>\n<li>Zhang, G. Han, X. Wang, <strong>M. Guizani<\/strong>, K. Fan, L. Shu, \u201cA Node Location Algorithm based on Node Movement Prediction in Underwater Acoustic Sensor Networks,\u201d <em>IEEE Transactions on Vehicular Technology<\/em>, Vol. PP, No. 99, 2019<\/li>\n<li>Yaacoub, K. Abualsaud, T. Khattab, <strong>M. Guizani<\/strong>, A. Chehab, \u201cSecure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach,\u201d <em>IEEE Wireless Communications<\/em>, Vol. 26, No. 5, 2019<\/li>\n<li>Zhang, Z. Zhang, H. Chao, <strong>M. Guizani<\/strong>, \u201cToward Intelligent Network Optimization in Wireless Networking: An Auto-Learning Framework,\u201d <em>IEEE Wireless Communications<\/em>, Vol. 26, No. 3, 2019<\/li>\n<li>Awan, I. Din, A. Almogren, <strong>M. Guizani<\/strong>, A. Altameem, S. Jadoon, \u201cRobustTrust \u2013 A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things,\u201d <em>IEEE Access<\/em>, Vol. 7, 2019<\/li>\n<li>Sun, Z. Chen, H. Yu, X. Du, <strong>M. Guizani<\/strong>, \u201cOnline Parallelized Service Function Chain Orchestration in Data Center Networks,\u201d <em>IEEE Access<\/em>, Vol. 7, 2019<\/li>\n<li>He, X. Tang, R. Zhang, X. Du, D. Zhou, <strong>M. Guizani<\/strong>, \u201cA Course-Aware Opportunistic Routing Protocol for FANETs,\u201d <em>IEEE Access<\/em>, Vol. 7, 2019<\/li>\n<li>He, X. Tang, R. Zhang, X. Du, D. Zhou, <strong>M. Guizani<\/strong>, \u201cSecure UAV Communication Networks over 5G,\u201d <em>IEEE Wireless Communications<\/em>, Vol. 26, No. 5, 2019<\/li>\n<li>Masood, G. Ammad, A. Almogren, A. Abbas, H. Khattak, I. Din, <strong>M. Guizani<\/strong>, M. Zuair, \u201cSpammer Detection and Fake User Identification on Social Networks,\u201d <em>IEEE Access<\/em>, Vol. 7, 2019<\/li>\n<li>Yao, W. Liao, X. Du, X. Cheng, <strong>M. Guizani<\/strong>, \u201cUsing Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks,\u201d <em>IEEE Internet of Things Journal<\/em>, Vol. PP, No. 6, 2019<\/li>\n<li>Bu, Y. Fang, G. Han, S. Mumtaz, <strong>M. Guizani<\/strong>, \u201cDesign of Protograph-LDPC-Based BICM-ID for Multi-Level-Cell (MLC) NAND Flash Memory,\u201d <em>IEEE Communications Letters<\/em>, Vol. 23, No. 7, 2019<\/li>\n<\/ol>\n<p><strong>Google Scholar<\/strong>:\u00a0https:\/\/scholar.google.com\/citations?user=RigrYkcAAAAJ&amp;hl=en&amp;oi=ao<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Xue, W. Meng, H. Zhou, D. S. L. Wei, M. Guizani, \u201cA Lightweight and Secure Group Key Based Handover Authentication [&hellip;]<\/p>\n","protected":false},"author":1068,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/users\/1068"}],"replies":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":3,"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":45,"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/pages\/42\/revisions\/45"}],"wp:attachment":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mguizani\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}