


default search action
Mohamed Mahmoud 0001
- > Home > Persons > Mohamed Mahmoud 0001
Publications
- 2025
[j66]Sultan Uddin Khan
, Mahmoud Nabil
, Mohamed M. E. A. Mahmoud
, Maazen Alsabaan
, Tariq Alshawi
:
Trojan Attack and Defense for Deep Learning Based Power Quality Disturbances Classification. IEEE Trans. Netw. Sci. Eng. 12(5): 3962-3974 (2025)- 2024
[j62]Islam Elgarhy
, Mahmoud M. Badr
, Mohamed M. E. A. Mahmoud
, Mahmoud Nabil Mahmoud
, Maazen Alsabaan
, Mohamed I. Ibrahem
:
Securing Smart Grid False Data Detectors Against White-Box Evasion Attacks Without Sacrificing Accuracy. IEEE Internet Things J. 11(20): 33873-33889 (2024)- 2022
[j48]Mahmoud Nabil
, Ahmed B. T. Sherif
, Mohamed Mahmoud
, Waleed Alasmary
, Maazen Alsabaan
:
Accurate and Privacy-Preserving Person Localization Using Federated-Learning and the Camera Surveillance Systems of Public Places. IEEE Access 10: 109894-109907 (2022)
[j41]Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. IEEE Trans. Dependable Secur. Comput. 19(1): 39-53 (2022)
[j40]Mohamed Baza
, Marbin Pazos-Revilla, Ahmed B. T. Sherif
, Mahmoud Nabil
, Abdulah Jeza Aljohani
, Mohamed Mahmoud
, Waleed Alasmary
:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids. IEEE Trans. Dependable Secur. Comput. 19(4): 2226-2243 (2022)- 2021
[j39]Maazen Alsabaan
, Waleed Alasmary
, Abdulaziz Alquniah, Mohamed Mahmoud
, Mahmoud Nabil
:
A Distributed Surveillance System With Full Coverage Guarantee Using Positive Orthogonal Codes. IEEE Access 9: 16837-16848 (2021)
[j38]Mahmoud Nabil
, Ahmed B. T. Sherif
, Mohamed Mahmoud
, Waleed Alasmary
, Maazen Alsabaan
:
Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics. IEEE Access 9: 79911-79926 (2021)
[j35]Mohamed I. Ibrahem
, Mahmoud Nabil
, Mostafa M. Fouda
, Mohamed M. E. A. Mahmoud
, Waleed Alasmary
, Fawaz Alsolami
:
Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks. IEEE Internet Things J. 8(2): 1243-1258 (2021)
[j32]Abdulrahman Takiddin
, Muhammad Ismail
, Mahmoud Nabil
, Mohamed M. E. A. Mahmoud
, Erchin Serpedin
:
Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings. IEEE Syst. J. 15(3): 4189-4198 (2021)
[j31]Mahmoud Nabil
, Ahmed B. T. Sherif
, Mohamed Mahmoud
, Ahmad Alsharif
, Mohamed M. Abdallah
:
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services. IEEE Trans. Dependable Secur. Comput. 18(3): 1291-1306 (2021)
[c49]Ahmed Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed Alasmary, Fathi H. Amsaad:
Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks. ISNCC 2021: 1-7
[c48]Muhammad Hataba, Ahmed B. T. Sherif, Mohamed Elsersy
, Mahmoud Nabil, Mohamed Mahmoud, Khaled Hatem Almotairi
:
Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System. MENACOMM 2021: 86-91- 2020
[c46]Ahmed Shafee, Mohamed Baza
, Douglas A. Talbert, Mostafa M. Fouda
, Mahmoud Nabil
, Mohamed Mahmoud:
Mimic Learning to Generate a Shareable Network Intrusion Detection Model. CCNC 2020: 1-6
[i17]Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks. CoRR abs/2005.13793 (2020)- 2019
[j24]Ahmad Alsharif
, Mahmoud Nabil
, Mohamed M. E. A. Mahmoud
, Mohamed M. Abdallah
:
EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks. IEEE Access 7: 27829-27845 (2019)
[j23]Mahmoud Nabil
, Muhammad Ismail, Mohamed M. E. A. Mahmoud
, Waleed Alasmary
, Erchin Serpedin
:
PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks. IEEE Access 7: 96334-96348 (2019)
[j21]Ahmad Alsharif
, Mahmoud Nabil
, Samet Tonyali
, Hawzhin Mohammed, Mohamed Mahmoud
, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks. IEEE Internet Things J. 6(2): 3309-3321 (2019)
[j20]Ahmad Alsharif
, Mahmoud Nabil
, Ahmed B. T. Sherif
, Mohamed Mahmoud
, Min Song
:
MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks. IEEE Internet Things J. 6(6): 10363-10374 (2019)
[c41]Mohamed Baza
, Mahmoud Nabil
, Muhammad Ismail, Mohamed Mahmoud
, Erchin Serpedin
, Mohammad Ashiqur Rahman
:
Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units. Blockchain 2019: 504-509
[c39]Mahmoud Nabil, Mohamed Mahmoud, Muhammad Ismail, Erchin Serpedin
:
Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning. iThings/GreenCom/CPSCom/SmartData 2019: 1002-1008
[c38]Ahmad Alsharif
, Ahmad Shafee, Mahmoud Nabil
, Mohamed Mahmoud, Waleed Alasmary:
A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication. iThings/GreenCom/CPSCom/SmartData 2019: 1025-1032
[c36]Mohamed Baza, Mahmoud Nabil
, Noureddine Lasla
, Kemal Fidan, Mohamed Mahmoud, Mohamed M. Abdallah:
Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles. WCNC 2019: 1-7
[i13]Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, Mohamed M. Abdallah:
Detecting Sybil Attacks using Proofs of Work and Location in VANETs. CoRR abs/1904.05845 (2019)
[i11]Ahmad Alsharif, Ahmad Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed S. Alasmary:
A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication. CoRR abs/1904.11105 (2019)
[i10]Ahmad Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud:
Mimic Learning to Generate a Shareable Network Intrusion Detection Model. CoRR abs/1905.00919 (2019)
[i9]Marbin Pazos-Revilla, Mohamed Baza, Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Waleed Alasmary:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid. CoRR abs/1905.04666 (2019)- 2018
[c35]Mahmoud Nabil
, Ahmad Alsharif
, Ahmed B. T. Sherif, Mohamed Mahmoud
, Mohamed F. Younis
:
Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings. ICC 2018: 1-6
[c34]Mahmoud Nabil
, Muhammad Ismail, Mohamed Mahmoud
, Mostafa Ali Shahin
, Khalid A. Qaraqe
, Erchin Serpedin
:
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters. ICPR 2018: 740-745
[c32]Ahmad Alsharif
, Mahmoud Nabil
, Mohamed Mahmoud
, Mohamed M. Abdallah
:
Privacy-Preserving Collection of Power Consumption Data for Enhanced AMI Networks. ICT 2018: 196-201
[i6]Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Ali Shahin
, Khalid A. Qaraqe, Erchin Serpedin:
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters. CoRR abs/1809.01774 (2018)
[i4]Mahmoud Nabil, Mohamed Mahmoud, Ahmed B. T. Sherif, Ahmad Alsharif, Mohamed M. Abdallah:
Efficient and Privacy-Preserving Ride SharingOrganization for Transferable andNon-Transferable Services. CoRR abs/1809.07314 (2018)
[i3]Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks. CoRR abs/1810.01851 (2018)
[i2]Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Ashiqur Rahman
:
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units. CoRR abs/1811.02001 (2018)
[i1]Mohamed Baza, Mahmoud Nabil, Noureddine Lasla
, Kemal Fidan, Mohamed Mahmoud, Mohamed M. Abdallah:
Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles. CoRR abs/1811.05905 (2018)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-26 23:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






