scispace - formally typeset
M

Mohammed Ali Al-Garadi

Researcher at Emory University

Publications -  84
Citations -  3816

Mohammed Ali Al-Garadi is an academic researcher from Emory University. The author has contributed to research in topics: Computer science & Social media. The author has an hindex of 20, co-authored 61 publications receiving 2074 citations. Previous affiliations of Mohammed Ali Al-Garadi include University of California, San Diego & Information Technology University.

Papers
More filters
Journal ArticleDOI

Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges

TL;DR: The focus of this review is to provide in-depth summaries of deep learning methods for mobile and wearable sensor-based human activity recognition, and categorise the studies into generative, discriminative and hybrid methods.
Journal ArticleDOI

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

TL;DR: A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Journal ArticleDOI

Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions

TL;DR: The focus of this review is to provide in-depth and comprehensive analysis of data fusion and multiple classifier systems techniques for human activity recognition with emphasis on mobile and wearable devices.
Journal ArticleDOI

Cybercrime detection in online communications

TL;DR: A set of unique features derived from Twitter; network, activity, user, and tweet content, based on these feature, a supervised machine learning solution for detecting cyberbullying in the Twitter network is developed.
Journal ArticleDOI

The rise of ransomware and emerging security challenges in the Internet of Things

TL;DR: The ransomware attacks and security concerns in IoT are presented and a few credible case studies are outlined to alert people regarding how seriously IoT devices are vulnerable to threats.