A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

Faculty members

Content

Experimental launch

Inside a building, a man dressed in a traditional white uniform with a red and white Saudi shemagh wears a neutral expression as if he were taking a picture of a faculty file at Qassim University.
Photo of the faculty member

Abdullatif Abdulrahman fihad Abdullatif

College:.
section

Personal data

    Scientific qualifications

    • Bachelor's Degree in Computer Science - Qassim University - Saudi Arabia
    • Master's Degree in Computer Science - RMIT University - Australia
    • PhD in Information Security - RMIT University - Australia

    Research interests

    • Information Security - Internet of Things - Cloud Computing

    Published research

    • The internet of things security: A survey encompassing unexplored areas and new insights (2022-01-01)
    • A systematic review of emerging feature selection optimization methods for optimal text classification: the current state and prospective opportunities (2021-01-01)
    • Security of blockchain and AI-empowered smart healthcare: application-based analysis (2022-01-01)
    • Secure edge of things for smart healthcare surveillance framework (2019-01-01)
    • Towards an intelligent intrusion detection system to detect malicious activities in cloud computing (2023-01-01)
    • Privacy-preserving federated learning cyber-threat detection for intelligent transportation systems with blockchain-based security (2023-01-01)
    • Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption (2020-01-01)
    • Hybrid SVD-based image watermarking schemes: a review (2021-01-01)
    • Secure data analytics for cloud-integrated internet of things applications (2016-01-01)
    • Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey (2022-01-01)
    • Comparative performance evaluation of intrusion detection based on machine learning in-vehicle controller area network bus (2021-01-01)
    • A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data (2023-01-01)
    • Hybrid cryptographic access control for cloud-based EHR systems (2016-01-01)
    • Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption (2017-01-01)
    • Integration of artificial intelligence (AI) with sensor networks: Trends, challenges, and future directions (2024-01-01)
    • Real-time secure health surveillance for smarter health communities (2018-01-01)
    • A deep-Q learning scheme for secure spectrum allocation and resource management in 6G environment (2022-01-01)
    • Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT) (2021-01-01)
    • SVBE: Searchable and verifiable blockchain-based electronic medical records system (2022-01-01)
    • Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform (2019-01-01)
    • Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities (2019-01-01)
    • Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure (2017-01-01)
    • COVID-CGAN: efficient deep learning approach for COVID-19 detection based on CXR images using conditional GANs (2021-01-01)
    • Protection of electronic health records (EHRs) in cloud (2013-01-01)
    • Multi-criteria decision-making methods for the evaluation of the social internet of things for the potential of defining human behaviors (2024-01-01)
    • Privacy aware internet of medical things data certification framework on healthcare blockchain of 5G edge (2022-01-01)
    • Synergy of AI and blockchain to secure electronic healthcare records (2025-01-01)
    • Dronessl: Self-supervised multimodal anomaly detection in internet of drone things (2024-01-01)
    • Detection of Ponzi scheme on Ethereum using machine learning algorithms (2023-01-01)
    • Design and implementation: an IoT-framework-based automated wastewater irrigation system (2022-01-01)
    • Towards secure searchable electronic health records using consortium blockchain (2022-01-01)
    • Blockchain-based secure voting mechanism underlying 5G network: A smart contract approach (2023-01-01)
    • A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges (2025-01-01)
    • Towards an unsupervised feature selection method for effective dynamic features (2021-01-01)
    • A cognitive deception model for generating fake documents to curb data exfiltration in networks during cyber-attacks (2022-01-01)
    • Internet of Things Authentication Protocols: Comparative Study. (2024-01-01)
    • An energy-aware, highly available, and fault-tolerant method for reliable IoT systems (2021-01-01)
    • Mitigating the risks of malware attacks with deep learning techniques (2023-01-01)
    • Leveraging artificial intelligence in blockchain-based e-health for safer decision making framework (2023-01-01)
    • A multi-layer semantic approach for digital forensics automation for online social networks (2022-01-01)
    • Internet-of-Things-enabled smart agriculture: security enhancement approaches (2024-01-01)
    • IoT-driven smart agriculture: security issues and authentication schemes classification (2024-01-01)
    • Machine learning model for offensive speech detection in online social networks slang content (2023-01-01)
    • GuardianAI: Privacy-preserving federated anomaly detection with differential privacy (2025-01-01)
    • CSVAG: Optimizing Vertical Handoff Using Hybrid Cuckoo Search and Genetic Algorithm-Based Approaches (2022-01-01)
    • Privacy-preserving data clustering in cloud computing based on fully homomorphic encryption (2017-01-01)
    • An exhaustive survey on authentication classes in the IoT environments (2024-01-01)
    • Bitcoin candlestick prediction with deep neural networks based on real time data (2021-01-01)
    • ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment. (2025-01-01)
    • A robust security detection strategy for next generation IoT networks (2025-01-01)
    • Security issues in internet of medical things (2024-01-01)
    • Analysis of deep learning-based intrusion detection systems in IoT environments (2025-01-01)
    • BlockPres IPFS: performance evaluation of blockchain based secure patients prescription record storage using IPFS for smart prescription management system (2025-01-01)
    • Deep learning-driven anomaly detection for IoMT-based smart healthcare systems (2024-01-01)
    • Privacy preserving cloud computation using Domingo-Ferrer scheme (2016-01-01)
    • Intelligent Transport System based Blockchain to Preventing Routing Attacks. (2023-01-01)
    • Fully homomorphic based privacy-preserving distributed expectation maximization on cloud (2020-01-01)
    • Developing food charity operations management system (2022-01-01)
    • Homomorphic encryption and collaborative machine learning for secure healthcare analytics (2025-01-01)
    • The global impact of artificial intelligence (2024-01-01)
    • Applications of Blockchain in Healthcare:: Review Study (2024-01-01)
    • A systematic literature review on task allocation and performance management techniques in cloud data center (2024-01-01)
    • An efficient lightweight hybrid model with attention mechanism for enhancer sequence recognition (2022-01-01)
    • Adaptation of Federated Explainable Artificial Intelligence for Efficient and Secure E-Healthcare Systems. (2024-01-01)
    • Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme (2023-01-01)
    • An efficient dual encryption of iomt data using lightweight security scheme for cloud based iot environment (2023-01-01)
    • Secure and interoperable IoMT-based smart homes (2025-01-01)
    • Multi-criterial based feature selection for health care system (2024-01-01)
    • Lightblocks: A trusted lightweight signcryption and consensus scheme for industrial iot ecosystems (2024-01-01)
    • Efficient spectrum sharing in 5G and beyond network: a survey (2025-01-01)
    • Blockchain-assisted onion routing protocol for internet of underwater vehicle communication (2023-01-01)
    • Software defined network and graph neural network-based anomaly detection scheme for high speed networks (2025-01-01)
    • Neuro-VGNB: Transfer learning-based approach for detecting brain stroke (2024-01-01)
    • Steam computing paradigm: Cross-layer solutions over cloud, fog, and edge computing (2024-01-01)
    • Adoption of blockchain to develop a deployable secure healthcare solution: An analysis (2024-01-01)
    • Fusion of artificial intelligence and game theory for resource allocation in non-orthogonal multiple access-assisted device-to-device cooperative communication (2023-01-01)
    • Hybrid cryptographic access control for cloud based electronic health records systems (2017-01-01)
    • Intelligent Transport Systems: Analysis of Applications, Security Challenges, and Robust Countermeasures. (2024-01-01)
    • The role of cybersecurity in confronting intellectual security threats (2023-01-01)
    • Integration of internet of things (IoT) and cloud computing: Privacy concerns and possible solutions (2018-01-01)
    • Integrated Bayesian and association-rules methods for autonomously orienting COVID-19 patients (2022-01-01)
    • EdgeSOM: Distributed hierarchical edge-driven IoT data analytics framework (2021-01-01)
    • Mitigating blackhole and greyhole routing attacks in vehicular ad hoc networks using blockchain based smart contracts (2024-01-01)
    • Evaluation study of elliptic curve cryptography scalar multiplication on raspberry Pi4 (2021-01-01)
    • Malware-SeqGuard: An Approach Utilizing LSTM and GRU for Effective Detection of Evolving Malware in Android Environments (2025-01-01)
    • Protecting Intellectual Security Through Hate Speech Detection Using an Artificial Intelligence Approach (2025-01-01)
    • Generalizability Assessment of Learning-Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity (2025-01-01)
    • Privacy-preserving data analytics in cloud computing (2024-01-01)
    • Artificial intelligence-driven cyberbullying detection: A survey of current techniques (2024-01-01)
    • Practical hybrid confidentiality-based analytics framework with Intel SGX (2021-01-01)
    • ECB-MFA: ECC-enabled blockchain-based mutual authentication scheme for resource-constrained IoMT devices in smart healthcare environments (2025-01-01)
    • Blockchain-Envisioned Onion Routing Framework for Internet of Vehicles Communication toward 6G (2024-01-01)
    • Optimized stacked auto-encoder for unnecessary data reduction in cloud of things (2022-01-01)
    • Secure data analytics for IoT cloud-enabled framework using Intel SGX (2020-01-01)
    • A lightweight semi-centralized authentication scheme for Internet of drones (IoD) networks (2026-01-01)
    • Machine learning based dynamic trust estimation framework for Securing wireless sensor networks (2025-01-01)
    • GANCHEST: a multi-GAN-based framework for chest CXR image generation and validation (2025-01-01)
    • A comprehensive survey of contemporary anomaly detection methods for Securing smart IoT systems (2025-01-01)
    • Elliptic curve cryptography and biometrics for IoT authentication (2025-01-01)
    • Robust approach to improve link prediction accuracy in directed social networks based on ensemble learning models and advanced feature extraction techniques-niques (2025-01-01)
    • UFODMV: Unsupervised feature selection for online dynamic multi-views (2023-01-01)
    • IoT-Based Scalable Framework for Pollution Aware Route Recommendation (2022-01-01)
    • Fine-tuning SpeechT5 for tamazight text-to-speech: a foundation for educational technology in low-resource languages (2026-01-01)
    • A critical systematic review of ensemble learning methods for predictive healthcare (2026-01-01)
    • Explainable Intelligence and LLM-Based Secure Framework for Industrial Internet of Things (2026-01-01)
    • Internet of Things and Green Technologies for Smart Environment (2026-01-01)
    • Improved Computational Diffie-Hellman-Based Mechanism for Cyber-Physical Security (2026-01-01)
    • for Cyber-Physical Security (2026-01-01)
    • A Lightweight Sequential AI Framework for Real Time Intrusion Detection in Dynamic Vehicular Networks (2026-01-01)
    • Evaluating Deep Learning Approaches for Intrusion Detection in IoT Networks (2026-01-01)
    • HFXL-Model: A Hybrid Deep Learning and Ensemble Boosting Framework for Binary Intrusion Detection in IoT Networks (2025-01-01)
    • Privacy-preserving medical image encryption based on blockchain and IPFS in 6G-enabled healthcare systems (2025-01-01)
    • Graph-augmented transformer ensemble framework for robust and scalable fake news detection in social media ecosystems (2025-01-01)
    • A lightweight trusted framework for secure data exchange and threat mitigation in IoT-enabled healthcare environments (2025-01-01)
    • Quantum Envisioned Edge Key Distribution System for 6G Assisted Internet-of-Battlefield-Things (2025-01-01)
    • Threat Modeling to Secure CPS-Based Critical Infrastructures (2025-01-01)
    • Machine learning: enhanced dynamic clustering for privacy preservation and malicious node detection in industrial internet of things (2025-01-01)
    • Multi-Generation Mixing-Based Network Coding for Reliable Data Dissemination in IoMT Environment (2025-01-01)
    • Federated Autoencoder Model for Secure Medical Image Analysis with Privacy Preservation and Assurance (2025-01-01)
    • Using Blockchain Technology in Healthcare Settings: Empowering Patients with Trustworthy Data (2025-01-01)
    • Blockchain-Based Network Security Analysis Framework for Telesurgery Systems in Healthcare (2025-01-01)
    • A Comprehensive Study on Deep Learning Techniques for IoT Security (2025-01-01)
    • FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities (2025-01-01)
    • Securing Healthcare Data in IoMT Using Hybrid Cryptosystem and Decentralized Storage Based Blockchain with IPFS (2025-01-01)
    • The Adoption of Artificial Intelligence for Higher Education Sustainability. (2025-01-01)
    • The Impact of Global Data Protection Laws on Cybersecurity Landscape (2024-01-01)
    • Smart Internet of Things for Environment and Healthcare (2024-01-01)
    • Rethinking urbanism in Doha: The Qatar National Museum transit-oriented development (2023-01-01)
    • Acknowledgment to the Reviewers of Electronics in 2022 (2023-01-01)
    • Correction to: Integrated Bayesian and association-rules methods for autonomously orienting COVID-19 patients (2022-01-01)
    • Computer and Information Sciences (2022-01-01)
    • AI-Driven Security for Next-Generation IoT Systems (2026-01-01)
    • A Lightweight Semi-Centralized (2026-01-01)
    • MOUNTAIN GAZELLE OPTIMIZED DEEP LEARNING MODEL FOR INTRUSION DETECTION AND MITIGATION IN CLOUD (2026-01-01)
    • MLSIA-LC: DEEP LEARNING-BASED MULTI-LEVEL SELF AND INTER-ATTENTION NETWORKS FOR LUNG CANCER CLASSIFICATION (2026-01-01)
    • COCKROACH SWARM OPTIMIZED SCHEDULE TASKING IN CLOUD ENVIRONMENT (2026-01-01)
    • ICWS 2025 Program Committee (2026-01-01)
    • WETICE 2021 Program Committee (2026-01-01)

    Teaching materials

    • Cryptography Course CS452 - Department of Computer Science - College of Computing

    Cookies

    This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy