Alert button
Picture for Abdulla Al-Ali

Abdulla Al-Ali

Alert button

Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization

Add code
Bookmark button
Alert button
May 23, 2021
Mohammed Jouhari, Abdulla Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi

Figure 1 for Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
Figure 2 for Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
Figure 3 for Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
Figure 4 for Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
Viaarxiv icon

Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions

Add code
Bookmark button
Alert button
Oct 23, 2018
Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla Al-Ali, Khaled A. Harras, Mohsen Guizani

Figure 1 for Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions
Figure 2 for Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions
Figure 3 for Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions
Figure 4 for Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions
Viaarxiv icon

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Add code
Bookmark button
Alert button
Jul 29, 2018
Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani

Figure 1 for A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Figure 2 for A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Figure 3 for A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Figure 4 for A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Viaarxiv icon