List of Publications

Total publications: 55
(1 arXiv paper, 19 journal papers, 24 conference papers, 8 book chapters, and 3 editorial articles)

arXiv Papers

  1. Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary, and Xuemin (Sherman) Shen, “Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning”, arXiv: 2011.03814, Nov. 2020. (arXiv)

Peer-Reviewed Journal Papers (Total Impact Factor = 84.258)

  1. Sally Aladdin, Samah El-Tantawy, Mostafa M. Fouda, and Adly S. Tag Eldien, “MARLA-SG: Multi-Agent Reinforcement Learning Algorithm for Efficient Demand Response in Smart Grid,” accepted in IEEE Access, Nov. 2020. (URL)(PDF)

  2. Sadman Sakib, Tahrat Tazrin, Mostafa M. Fouda, Zubair Md. Fadlullah, and Nidal Nasser, “A Deep Learning Method for Predictive Channel Assignment in Beyond 5G Networks,” IEEE Network, doi: 10.1109/MNET.011.2000301. (URL)

  3. Sadman Sakib, Tahrat Tazrin, Mostafa M. Fouda, Zubair Md. Fadlullah, and Nidal Nasser, “An Efficient and Light-weight Predictive Channel Assignment Scheme for Multi-Band B5G Enabled Massive IoT: A Deep Learning Approach,” IEEE Journal of Internet of Things, doi: 10.1109/JIOT.2020.3032516. (URL)

  4. Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, and Fawaz Alsolami, “Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks”, IEEE Internet of Things Journal, doi: 10.1109/JIOT.2020.3026692. (URL)(arXiv)

  5. Ahmed Shafee, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Abdulah J. Aljohani, and Fathi Amsaad, “Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning”, IEEE Access, vol. 8, pp. 179400–179414, Oct. 2020. (URL)(PDF)

  6. Sadman Sakib, Tahrat Tazrin, Mostafa M. Fouda, Zubair Md. Fadlullah, and Mohsen Guizani, “DL-CRC: Deep Learning-based Chest Radiograph Classification for COVID-19 Detection: A Novel Approach,” IEEE Access, vol. 8, pp. 171575–171589, Sep. 2020. (URL)(PDF)

  7. Mahmoud M. Badr, Wesam A. Amiri, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Abdulah J. Aljohani and Waleed Alasmary, Smart Parking System With Privacy Preservation and Reputation Management Using Blockchain, IEEE Access, vol. 8, pp. 150823150843, Aug. 2020. (URL)(PDF)

  8. Ahmed G. S. S. Deabes, Michael N. Mikheal, Mostafa Fouda, Hala A. E. Mansour, “Energy Conservation using K-Means Algorithm for IoT Networks,” Engineering Research Journal (ERJ), Shoubra Faculty of Engineering, vol. 1, no. 43, pp. 87–91, Jan. 2020. (PDF)

  9. Maha Gaber, Ashraf A. Eltholth, Mostafa M. Fouda, and Hala A.K. Mansour, “Novel Repeating Clipping and Filter with Partial Transmit Sequence Technique for Reducing PAPR in FBMC/OQAM System,” WSEAS Transactions on Communications, vol. 18, pp. 124–132, 2019. (PDF)

  10. Esraa Mosleh Eid, Mostafa M. Fouda, Adly S. Tag Eldien and Mohsen M. Tantawy, “Performance Analysis of 5-ary MUSA and SCMA for Uplink Transmission,” Indonesian Journal of Electrical Engineering and Computer (IJEECS), vol. 15, no. 1, pp. 365–372, Jul. 2019. (URL)(PDF)

  11. Maha Gaber, Ashraf A. Eltholth, Mostafa M. Fouda, and Hala A.K. Mansour, “Selective Iterative Clipping And Filter With Partial Transmit Sequence Technique Reducing PAPR In FBMC/OQAM System,” Far East Journal of Electronics and Communications, Pushpa Publishing House, vol. 18, no. 8, pp. 1219–1238, Nov. 2018. (URL)

  12. Hala G. Farrag, Reham S. Saad, Mostafa M. Fouda, and Hala A. K. Mansour , “Profit Distribution in Micro-grid,” Journal of Engineering Sciences (JES), Assiut University Faculty of Engineering, vol. 46, no. 4, pp. 409–424, Jul. 2018. (URL)

  13. Mahmoud M. Badr, Mostafa M. Fouda, and Adly S. Tag Eldien, “Enhanced FFR Scenario for Pilot Contamination Mitigation in 5G Systems with Massive MIMO,” Benha Journal of Applied Sciences (BJAS), vol. 2, no. 1, pp. 99–104, Oct. 2017. (PDF)

  14. Mohamed I. Hamed, Basem M. ElHalawany, Mostafa M. Fouda, and Adly S. Tag Eldien, “Performance Analysis of Applying Load Balancing Strategies on Different SDN Environments,” Benha Journal of Applied Sciences (BJAS), vol. 2, no. 1, pp. 91–97, Oct. 2017. (PDF)

  15. Mostafa M. Fouda, Hiroki Nishiyama, Ryu Miura, and Nei Kato, “On Efficient Traffic Distribution for Disaster Area Communication Using Wireless Mesh Networks,” Wireless Personal Communications, Springer, vol. 74, no. 4, pp. 1311–1327, Feb. 2014. (URL)

  16. Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, and Mostafa M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks,” IEEE Network, vol. 27, no. 3, pp. 51–56, Jun. 2013. (URL)

  17. Mostafa M. Fouda, Zubair Md. Fadlullah, Mohsen Guizani, and Nei Kato, “A Novel P2P VoD Streaming Technique Integrating Localization and Congestion Awareness Strategies,” Mobile Networks and Applications (MONE), Springer, vol. 17, no. 5, pp. 594–603, Oct. 2012. (URL)

  18. Mostafa M. Fouda, Zubair Md. Fadlullah, Nei Kato, Rongxing Lu, and Xuemin (Sherman) Shen, “A Lightweight Message Authentication Scheme for Smart Grid Communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, Dec. 2011. (URL)

  19. Zubair Md. Fadlullah, Mostafa M. Fouda, Xuemin (Sherman) Shen, Yousuke Nozaki, and Nei Kato, “An Early Warning System Against Malicious Activities for Smart Grid Communications,” IEEE Network, vol. 25, no. 5, pp. 50–55, Oct. 2011. (URL)

  20. Zubair Md. Fadlullah, Mostafa M. Fouda, Nei Kato, Akira Takeuchi, Noboru Iwasaki, and Yousuke Nozaki, “Toward Intelligent Machine-to-Machine Communications in Smart Grid,” IEEE Communications Magazine, vol. 49, no. 4, pp. 60–65, Apr. 2011. (URL)

International Conference Papers

  1. Mohamed I. Ibrahem, Mahmoud M. Badr, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, and Zubair Md. Fadlullah, “PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI Networks,” Proc. of the IEEE International Symposium on Networks, Computers and Communications (ISNCC’20), Montreal, Canada, Oct. 20–22, 2020.

  2. Rhana M. Elshishtawy, Adly S. Tag Eldien, Mostafa M. Fouda, and Ahmed H. Eldeib, “Performance Analysis of Spectrum Sensing Thresholding Methods for Cognitive Radio Networks,” Proc. of the 6th International Conference on Advanced Intelligent Systems and Informatics (AISI’20), Cairo, Egypt, Oct. 19–21, 2020. (URL)

  3. Sadman Sakib, Mostafa M. Fouda, Zubair Md. Fadlullah, and Nidal Nasser, “Migrating Intelligence From Cloud to Ultra-Edge Smart IoT Sensor Based on Deep Learning: An Arrhythmia Monitoring Use-Case,” Proc. of the International Conference on Wireless Communications & Mobile Computing (IWCMC’20), Limassol, Cyprus, Jun. 15–19, 2020. (URL)

  4. Attayeb Mohsen, Muftah Al-Mahdawi, Mostafa M. Fouda, Mikihiko Oogane, Yasuo Ando, and Zubair Md Fadlullah, “AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application,” Proc. of the IEEE International Conference on Communications (ICC’20), Dublin, Ireland, Jun. 7–11, 2020. (URL) (arXiv)

  5. Zaher Haddad, Mostafa M. Fouda, Mohamed Mahmoud and Mohamed Abdallah, “Blockchain-based Authentication for 5G Networks,” Proc. of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT’20), Doha, Qatar, Feb. 2–5, 2020. (URL)

  6. Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, and Mohamed Mahmoud, “Mimic Learning to Generate a Shareable Network Intrusion Detection Model,” Proc. of the 17th IEEE Consumer Communications and Networking Conference (IEEE CCNC’20), Las Vegas, USA, Jan. 11–14, 2020. (URL)

  7. Rhana M. Elshishtawy, Adly S. Tag Eldien, Mostafa M. Fouda, and Ahmed H. Eldeib, “Implementation of Multi-Channel Energy Detection Spectrum Sensing Technique in Cognitive Radio Network Using LabVIEW on USRP-2942R,” Proc. of the 15th International Computer Engineering Conference (ICENCO’19), Giza, Egypt, Dec. 29–30, 2019. (URL)

  8. Omnia Hashad, Basem M. ElHalawany, Mostafa M. Fouda, and Adly S. Tag Eldien, “Joint Resources Allocation of Device-to-Device Communications Underlaying Cellular Networks,” Proc. of the 7th International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC’19), Alexandria, Egypt, Dec. 15–16, 2019. (URL)

  9. Mohamed I. Hamed, Basem M. ElHalawany, Mostafa M. Fouda, and Adly S. Tag Eldien, “A Novel Approach for Resource Utilization and Management in SDN,” Proc. of the 13th International Computer Engineering Conference (ICENCO’17), Giza, Egypt, pp. 337–342, Dec. 27–28, 2017. (URL)

  10. Ahmed M. Bakr, Mostafa M. Fouda, May Salama, Abdelwahab K. Alsammak, and Hossam Yahia, “Hazard Analysis of Real-time Safety Critical Systems Using Hierarchical Communicating Real-time State Machines Formal Model,” Proc. of the 12th International Conference on Computer Engineering and Systems (ICCES’17), Cairo, Egypt, pp. 628–634, Dec. 19–20, 2017. (URL)

  11. Mahmoud M. Badr, Mostafa M. Fouda, and Adly S. Tag Eldien, “A Spatiotemporal Scenario to Mitigate Pilot Contamination in 5G Massive MIMO Systems,” Proc. of the 12th International Conference on Computer Engineering and Systems (ICCES’17), Cairo, Egypt, pp. 95–100, Dec. 19–20, 2017. (URL)

  12. Esraa Mosleh Eid, Mostafa M. Fouda, Adly S. Tag Eldien and Mohsen M. Tantawy, “Performance Analysis of MUSA with Different Spreading Codes Using Ordered SIC Methods,” Proc. of the 12th International Conference on Computer Engineering and Systems (ICCES’17), Cairo, Egypt, pp. 101–106, Dec. 19–20, 2017. (URL)

  13. Ahmed M. Bakr, Mostafa M. Fouda, May Salama, Abdelwahab K. Alsammak, and Hossam Yahia, “Modeling Real-time Safety Critical Systems Using Hierarchical Communicating Real-time State Machines and C-lang Parser,” Proc. of the 8th IEEE International Conference on Intelligent Computing and Information Systems (ICICIS’17), Cairo, Egypt, pp. 244–251, Dec. 5–7, 2017. (URL)

  14. Mohamed I. Hamed, Basem M. ElHalawany, Mostafa M. Fouda, and Adly S. Tag Eldien, “A New Approach for Server-based Load Balancing Using Software-defined Networking,” Proc. of the 8th IEEE International Conference on Intelligent Computing and Information Systems (ICICIS’17), Cairo, Egypt, pp. 30–35, Dec. 5–7, 2017. (URL)

  15. Ashraf A. Eltholth, Maha Gaber, Mostafa M. Fouda, and Hala A.K. Mansour, “Convolutional Constellation Mapping Technique for PAPR Reduction in Filter Bank Multi-Carrier,” Proc. of the IEEE International Conference on Signal and Image Processing Applications (IEEE ICSIPA’17), Kuching, Malaysia, pp. 464–468, Sept. 12–14, 2017. (URL)

  16. Mahmoud M. Badr, Mostafa M. Fouda, and Adly S. Tag Eldien, “A Novel Vision to Mitigate Pilot Contamination in Massive MIMO-based 5G Networks,” Proc. of the 11th International Conference on Computer Engineering and Systems (ICCES’16), Cairo, Egypt, pp. 366–371, Dec. 20–21, 2016. (URL)

  17. Mohamed I. Baza, Mostafa M. Fouda, Adly S. Tag Eldien, and Hala A.K. Mansour, “An Efficient Distributed Approach for Key Management in Microgrids,” Proc. of 11th the International Computer Engineering Conference (ICENCO’15), Giza, Egypt, pp. 19–24, Dec. 29–30, 2015. (URL)

  18. Mostafa M. Fouda, Zubair Md. Fadlu llah, Nei Kato, Akira Takeuchi, and Yousuke Nozaki, “A Novel Demand Control Policy for Improving Quality of Power Usage in Smart Grid,” Proc. of the IEEE Global Communications Conference (Globecom’12), Anaheim, California, USA, pp. 5154–5159, Dec. 3–7, 2012. (URL)

  19. Mostafa M. Fouda, Hiroki Nishiyama, and Nei Kato, “A Novel Heuristic-based Traffic Distribution Method for Disaster Zone Wireless Mesh Networks,” Proc. of the IEEE International Conference on Communications in China (IEEE ICCC’12), Beijing, China, pp. 179–184, Aug. 15–17, 2012. (URL)

  20. Mostafa M. Fouda, Zubair Md. Fadlullah, Nei Kato, Rongxing Lu, and Xuemin (Sherman) Shen, “Towards a Light-weight Message Authentication Mechanism Tailored for Smart Grid Communications,” Proc. of the IEEE International Conference on Computer Communications Workshops (IEEE INFOCOM WKSHPS’11), Shanghai, China, pp. 1018–1023, Apr. 10–15, 2011. (URL)

  21. Mostafa M. Fouda, Zubair Md. Fadlullah, and Nei Kato, “Assessing Attack Threat Against ZigBee-based Home Area Network for Smart Grid Communications,” Proc. of the 6th IEEE International Conference on Computer Engineering and Systems (ICCES’10), Cairo, Egypt, pp. 245–250, Nov. 30–Dec. 2, 2010. (URL)

  22. Mostafa M. Fouda, Tarik Taleb, Mohsen Guizani, and Nei Kato, “Towards Efficient P2P-based VoD Provisioning in Future Internet,” Proc. of the International ICST Conference on Communications and Networking in China (CHINACOM’10), Beijing, China, Aug. 25–27, 2010. (URL)

  23. Mostafa Fouda, Tarik Taleb, Mohsen Guizani, Yoshiaki Nemoto, and Nei Kato, “On Supporting P2P-based VoD Services over Mesh Overlay Networks,” Proc. of the IEEE Global Communications Conference (GLOBECOM’09), Honolulu, Hawaii, USA, Nov. 30–Dec. 4, 2009. (URL)

  24. Nawal El-Fishawy, Hala A.K. Mansour, and Mostafa Fouda, “Dynamic Reservation/Allocation TDMA MAC Protocol for Wireless ATM Networks,” Proc. of the International Computer Engineering Conference (ICENCO’06), Giza, Egypt, Dec. 26–28, 2006.

Book Chapters

  1. Sarthak Kothari, Dhruvi Desai, Anam Parveen, Tahrat Tazrin, Mostafa M. Fouda, and Zubair Md. Fadlullah, “On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge,” accepted book chapter in Secure Edge Computing: Applications, Techniques and Challenges, to be Published by CRC Press, USA, 2021.

  2. Amit Kumar, Arti Sharma, Shivani Chaskar, Sadman Sakib, Mostafa M. Fouda, and Zubair Md. Fadlullah, “AI-aided ECG Change Point Detection for Bio-authentication at the Edge,” accepted book chapter in Secure Edge Computing: Applications, Techniques and Challenges, to be Published by CRC Press, USA, 2021.

  3. Naveen Kumar Oburi, Prem Sagar, Akshai Ramesh, Sadman Sakib, Mostafa M. Fouda, and Zubair Md. Fadlullah, “Early Identification of Mental Health Disorder Employing Machine Learning-based Secure Edge Analytics: A Real-time Monitoring System”, accepted book chapter in Secure Edge Computing: Applications, Techniques and Challenges, to be Published by CRC Press, USA, 2021.

  4. Sadman Sakib, Mostafa M. Fouda, and Zubair Md. Fadlullah, “Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia Classification,” accepted book chapter in Secure Edge Computing: Applications, Techniques and Challenges, to be Published by CRC Press, USA, 2021.

  5. Zubair Md. Fadlullah, and Mostafa M. Fouda, “Authentication Methodology for Securing Machine-to-Machine Communication in Smart Grid,” in Combating Security Challenges in the Age of Big Data: Powered By State of the Art AI Techniques, ISBN: 978-3030356415, CRC Press, USA , 2020, pp. 189-213. (URL)

  6. Zubair Md. Fadlullah, and Mostafa M. Fouda, “Combating Intrusions in Smart Grid: Practical Defense and Forecasting Approaches,” in Combating Security Challenges in the Age of Big Data: Powered By State of the Art AI Techniques, ISBN: 978-3030356415, CRC Press, USA , 2020, pp. 215-235. (URL)

  7. Mohamed Baza, Mostafa M. Fouda, Mahmoud Nabil, Adly Tag Eldien, Hala Mansour, and Mohamed Mahmoud, “Blockchain-based Distributed Key Management Approach Tailored for Smart Grid,” in Combating Security Challenges in the Age of Big Data: Powered By State of the Art AI Techniques, ISBN: 978-3030356415, CRC Press, USA , 2020, pp. 237-263. (URL)

  8. Mostafa M. Fouda , Zubair Md. Fadlullah, Al-Sakib Khan Pathan, and Nei Kato, “Peer-to-Peer Video-On-Demand in Future Internet,” in Building Next-Generation Converged Networks: Theory and Practice, ISBN: 978-1466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 119-134. (URL)

Editorial Articles (Total Impact Factor = 3.96)

  1. Zubair Fadlullah, Mostafa M. Fouda, Al-Sakib Khan Pathan, Nidal Nasser, Abderrahim Benslimane, and Ying-Dar Lin, “Smart IoT Solutions for Combating COVID-19 Pandemic,” IEEE Internet of Things Magazine, vol. 3, no. 3, pp. 1011, Sep. 2020. (URL)

  2. Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa Fouda, Muhammad Mostafa Monowar, and Philip Korn, “Information Integrity in Smart Grid Systems,” Journal of Information Systems, Elsevier, vol. 53, pp. 145–146, Oct.–Nov. 2015. (URL)

  3. Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa Fouda, and Hae Young Lee, “Defending against Wireless Network Intrusion”, Journal of Computer and System Sciences, Elsevier, vol. 80, no. 3, pp. 499–501, May 2014. (URL)