|Facial expression recognition utilizing local direction-based robust features and deep belief network|
MZ Uddin, MM Hassan, A Almogren, A Alamri, M Alrubaian, G Fortino
IEEE Access 5, 4525-4536, 2017
|A performance evaluation of machine learning-based streaming spam tweets detection|
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational social systems 2 (3), 65-76, 2015
|Sybil defense techniques in online social networks: a survey|
M Al-Qurishi, M Al-Rakhami, A Alamri, M Alrubaian, SMM Rahman, ...
IEEE Access 5, 1200-1219, 2017
|Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data|
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
|A credibility analysis system for assessing information on twitter|
M Alrubaian, M Al-Qurishi, MM Hassan, A Alamri
IEEE Transactions on Dependable and Secure Computing 15 (4), 661-674, 2016
|BiSAL–A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security|
K Al-Rowaily, M Abulaish, NAH Haldar, M Al-Rubaian
Digital Investigation 14, 53-62, 2015
|Human activity recognition from body sensor data using deep learning|
MM Hassan, S Huda, MZ Uddin, A Almogren, M Alrubaian
Journal of medical systems 42 (6), 99, 2018
|Reputation‐based credibility analysis of Twitter social network users|
M Alrubaian, M Al‐Qurishi, M Al‐Rakhami, MM Hassan, A Alamri
Concurrency and Computation: Practice and Experience 29 (7), e3873, 2017
|Maximizing quality of experience through context‐aware mobile application scheduling in Cloudlet infrastructure|
MR Mahmud, M Afrin, MA Razzaque, MM Hassan, A Alelaiwi, M Alrubaian
Software: Practice and Experience 46 (11), 1525-1545, 2016
|Big media healthcare data processing in cloud: a collaborative resource management perspective|
AK Das, T Adhikary, MA Razzaque, M Alrubaian, MM Hassan, MZ Uddin, ...
Cluster Computing 20 (2), 1599-1614, 2017
|Quality of service aware reliable task scheduling in vehicular cloud computing|
T Adhikary, AK Das, MA Razzaque, A Almogren, M Alrubaian, ...
Mobile Networks and Applications 21 (3), 482-493, 2016
|A multistage credibility analysis model for microblogs|
M AlRubaian, M Al-Qurishi, M Al-Rakhami, SMM Rahman, A Alamri
2015 IEEE/ACM International Conference on Advances in Social Networks …, 2015
|Leveraging analysis of user behavior to identify malicious activities in large-scale social networks|
M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri
IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017
|A hybrid deep learning model for efficient intrusion detection in big data environment|
MM Hassan, A Gumaei, A Alsanad, M Alrubaian, G Fortino
Information Sciences 513, 386-396, 2020
|Quality of service aware cloud resource provisioning for social multimedia services and applications|
T Adhikary, AK Das, MA Razzaque, M Alrubaian, MM Hassan, A Alamri
Multimedia Tools and Applications 76 (12), 14485-14509, 2017
|Credibility in online social networks: A survey|
M Alrubaian, M Al-Qurishi, A Alamri, M Al-Rakhami, MM Hassan, ...
IEEE Access 7, 2828-2855, 2018
|A prediction system of Sybil attack in social network using deep-regression model|
M Al-Qurishi, M Alrubaian, SMM Rahman, A Alamri, MM Hassan
Future Generation Computer Systems 87, 743-753, 2018
|Selecting the best open source tools for collecting and visualzing social media content|
M Al-Qurishi, M Al-Rakhami, M Alrubaian, A Alarifi, SMM Rahman, ...
2015 2nd world symposium on web applications and networking (WSWAN), 1-6, 2015
|An efficient key agreement protocol for Sybil-precaution in online social networks|
M Al-Qurishi, SMM Rahman, MS Hossain, A Almogren, M Alrubaian, ...
Future Generation Computer Systems 84, 139-148, 2018
|Detecting spamming activities in twitter based on deep‐learning technique|
T Wu, S Wen, S Liu, J Zhang, Y Xiang, M Alrubaian, MM Hassan
Concurrency and Computation: Practice and Experience 29 (19), e4209, 2017