PhD, Electrical Engineering, Michigan State University
MSc, Communications Engineering, Cairo University
Bachelor of Electronics and Communications Engineering, Cairo University
Karimi, L., Aldairi, M., Joshi, J., & Abdelhakim, M. (2022). An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19(4), 2304-2317.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TDSC.2021.3054331.
Alotibi, F., & Abdelhakim, M. (2021). Anomaly Detection for Cooperative Adaptive Cruise Control in Autonomous Vehicles Using Statistical Learning and Kinematic Model. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 22(6), 3468-3478.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TITS.2020.2983392.
Abdelhakim, A., Saleh, H.I., & Abdelhakim, M. (2019). Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. MULTIMEDIA TOOLS AND APPLICATIONS, 78(22), 32523-32563.Springer Science and Business Media LLC. doi: 10.1007/s11042-019-07986-3.
Abdelhakim, A.M., & Abdelhakim, M. (2018). A time-efficient optimization for robust image watermarking using machine learning. EXPERT SYSTEMS WITH APPLICATIONS, 100, 197-210.Elsevier BV. doi: 10.1016/j.eswa.2018.02.002.
Liu, X., Abdelhakim, M., Krishnamurthy, P., & Tipper, D. (2018). Identifying malicious nodes in multihop iot networks using dual link technologies and unsupervised learning. Open Journal of Internet of Things, 4(1), 109-124.RonPub.
Abdelhakim, M., Liang, Y., & Li, T. (2017). Mobile Access Coordinated Wireless Sensor Networks-Design and Analysis. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 3(1), 172-186.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TSIPN.2016.2601021.
Abdelhakim, M., Liang, Y., & Li, T. (2016). Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 34(5), 1663-1675.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/JSAC.2016.2545383.
Abdelhakim, M., Fang, Z., Ren, J., & Li, T. (2015). Hybrid mobile access coordinated wireless sensor networks — Design and analysis. 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), 453-457.IEEE. doi: 10.1109/chinasip.2015.7230443.
Abdelhakim, M., Lightfoot, L., Ren, J., & Li, T. (2015). Reliable Communications over Multihop Networks under Routing Attacks. 2015 IEEE Global Communications Conference (GLOBECOM).IEEE. doi: 10.1109/glocom.2015.7417404.
Abdelhakim, M., Lightfoot, L.E., Ren, J., & Li, T. (2014). Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(4), 950-959.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TPDS.2013.74.
Abdelhakim, M., Ren, J., & Li, T. (2014). Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. 2014 IEEE Global Communications Conference, 4616-4621.IEEE. doi: 10.1109/glocom.2014.7037536.
Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(5), 772-781.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TIFS.2014.2310355.
Li, T., Abdelhakim, M., & Ren, J. (2014). N-HOP NETWORKS: A GENERAL FRAMEWORK FOR WIRELESS SYSTEMS. IEEE WIRELESS COMMUNICATIONS, 21(2), 98-105.Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/MWC.2014.6812297.
Abdelhakim, M., Lightfoot, L.E., Ren, J., & Li, T. (2013). Architecture design of mobile access coordinated wireless sensor networks. 2013 IEEE International Conference on Communications (ICC), 1720-1724.IEEE. doi: 10.1109/icc.2013.6654766.
Abdelhakim, M., Nafie, M., Shalash, A., & Elezabi, A. (2013). Adaptive Bit Loading and Puncturing Using Long Single Codewords in OFDM Systems. WIRELESS PERSONAL COMMUNICATIONS, 71(2), 1557-1576.Springer Science and Business Media LLC. doi: 10.1007/s11277-012-0892-z.
Abdelhakim, M., Ren, J., & Li, T. (2013). Mobile access coordinated wireless sensor networks — Topology design and throughput analysis. 2013 IEEE Global Communications Conference (GLOBECOM), 4627-4632.IEEE. doi: 10.1109/glocomw.2013.6855681.
Alahmadi, A., Abdelhakim, M., Jian Ren, & Tongtong Li. (2013). Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. 2013 IEEE Global Communications Conference (GLOBECOM), 3229-3234.IEEE. doi: 10.1109/glocom.2013.6831569.
Abdelhakim, M., Jian Ren, & Tongtong Li. (2012). Reliable OFDM system design under hostile multi-tone jamming. 2012 IEEE Global Communications Conference (GLOBECOM), 4290-4295.IEEE. doi: 10.1109/glocom.2012.6503792.
Abdelhakim, M., Ren, J., & Li, T. (2012). Reliable Cooperative Sensing in Cognitive Networks. International Conference on Wireless Algorithms, Systems, and Applications, 7405 LNCS, 206-217.Springer Berlin Heidelberg. doi: 10.1007/978-3-642-31869-6_18.
Abdelhakim, M., Lightfoot, L.E., & Li, T. (2011). Reliable data fusion in wireless sensor networks under Byzantine attacks. 2011 - MILCOM 2011 Military Communications Conference, 810-815.IEEE. doi: 10.1109/milcom.2011.6127777.
Abdelhakim, M., Zhang, L., Ren, J., & Li, T. (2011). Cooperative sensing in cognitive networks under malicious attack. 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 3004-3007.IEEE. doi: 10.1109/icassp.2011.5946290.
Abdelhakim, M., Nafie, M., Shalash, A., & Elezabi, A.Y. (2009). Adaptive Puncturing for Coded OFDMA Systems. 2009 IEEE International Conference on Communications, 1-5.IEEE. doi: 10.1109/icc.2009.5198706.
Abdelhakim, M., Nafie, M., Shalash, A., & Elezabi, A.Y. (2009). Adaptive Puncturing and Rate Selection in Single-Codeword Turbo-Coded OFDMA. 2009 IEEE Mobile WiMAX Symposium, 174-179.IEEE. doi: 10.1109/mws.2009.31.
Akhuseyinoglu, N.B., Karimi, M., Abdelhakim, M., & Krishnamurthy, P. (2020). On Automated Trust Computation in IoT with Multiple Attributes and Subjective Logic. In 2020 IEEE 45th Conference on Local Computer Networks (LCN), 2020-November, (pp. 267-278).IEEE. doi: 10.1109/lcn48667.2020.9314808.
Alotibi, F., & Abdelhakim, M. (2019). Anomaly Detection in Cooperative Adaptive Cruise Control Using Physics Laws and Data Fusion. In 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 2019-September.IEEE. doi: 10.1109/vtcfall.2019.8891165.
Abdelhakim, M., Liu, X., & Krishnamurthy, P. (2018). Diversity for Detecting Routing Attacks in Multihop Networks. In 2018 International Conference on Computing, Networking and Communications (ICNC), (pp. 712-717).IEEE. doi: 10.1109/iccnc.2018.8390382.
Liu, X., Abdelhakim, M., Krishnamurthy, P., & Tipper, D. (2018). Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning. In 2018 IEEE International Conference on Communications (ICC), 2018-May.IEEE. doi: 10.1109/icc.2018.8422484.
Abdelhakim, M., Lightfoot, L., Ren, J., & Li, T. (2014). Reliable Communications over Multihop Networks under Routing Attacks. In 2015 IEEE Global Communications Conference (GLOBECOM).IEEE. doi: 10.1109/glocom.2014.7417404.