Bassam J. Mohd

1.5k total citations
54 papers, 1.1k citations indexed

About

Bassam J. Mohd is a scholar working on Computer Networks and Communications, Computer Vision and Pattern Recognition and Artificial Intelligence. According to data from OpenAlex, Bassam J. Mohd has authored 54 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Networks and Communications, 19 papers in Computer Vision and Pattern Recognition and 17 papers in Artificial Intelligence. Recurrent topics in Bassam J. Mohd's work include Chaos-based Image/Signal Encryption (12 papers), Cryptographic Implementations and Security (11 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (7 papers). Bassam J. Mohd is often cited by papers focused on Chaos-based Image/Signal Encryption (12 papers), Cryptographic Implementations and Security (11 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (7 papers). Bassam J. Mohd collaborates with scholars based in Jordan, United States and Kuwait. Bassam J. Mohd's co-authors include Thaier Hayajneh, Athanasios V. Vasilakos, Sa’ed Abed, Ghada Almashaqbeh, Khalil M. Ahmad Yousef, Mohammad H. Alshayeji, Joseph P. Campbell, Muhammad Imran, Sahel Alouneh and Sana Ullah and has published in prestigious journals such as IEEE Access, Sensors and Future Generation Computer Systems.

In The Last Decade

Bassam J. Mohd

48 papers receiving 1.0k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Bassam J. Mohd Jordan 19 492 380 343 307 239 54 1.1k
Muhammad Nadzir Marsono Malaysia 18 675 1.4× 409 1.1× 115 0.3× 258 0.8× 180 0.8× 129 1.1k
Nasour Bagheri Iran 18 475 1.0× 352 0.9× 178 0.5× 385 1.3× 152 0.6× 99 995
Gérard Memmi France 14 370 0.8× 381 1.0× 170 0.5× 340 1.1× 156 0.7× 41 1.2k
Srivaths Ravi United States 11 406 0.8× 520 1.4× 154 0.4× 217 0.7× 234 1.0× 14 972
Nicolas Sklavos Greece 24 702 1.4× 1.0k 2.7× 621 1.8× 419 1.4× 265 1.1× 138 1.9k
René Hummen Germany 14 1.1k 2.2× 236 0.6× 110 0.3× 365 1.2× 199 0.8× 28 1.2k
Yi Tang China 12 480 1.0× 470 1.2× 108 0.3× 347 1.1× 102 0.4× 60 948
Fushan Wei China 19 747 1.5× 564 1.5× 145 0.4× 733 2.4× 181 0.8× 64 1.3k
Gregor Schiele Germany 13 608 1.2× 300 0.8× 297 0.9× 278 0.9× 56 0.2× 80 1.0k

Countries citing papers authored by Bassam J. Mohd

Since Specialization
Citations

This map shows the geographic impact of Bassam J. Mohd's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Bassam J. Mohd with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Bassam J. Mohd more than expected).

Fields of papers citing papers by Bassam J. Mohd

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Bassam J. Mohd. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Bassam J. Mohd. The network helps show where Bassam J. Mohd may publish in the future.

Co-authorship network of co-authors of Bassam J. Mohd

This figure shows the co-authorship network connecting the top 25 collaborators of Bassam J. Mohd. A scholar is included among the top collaborators of Bassam J. Mohd based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Bassam J. Mohd. Bassam J. Mohd is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yousef, Khalil M. Ahmad, et al.. (2024). Automated Vulnerability Exploitation Using Deep Reinforcement Learning. Applied Sciences. 14(20). 9331–9331.
2.
Mohd, Bassam J., et al.. (2024). Quantization-Based Optimization Algorithm for Hardware Implementation of Convolution Neural Networks. Electronics. 13(9). 1727–1727. 2 indexed citations
3.
Yousef, Khalil M. Ahmad, et al.. (2024). Security Risk Assessment of Humanoid Robotics: DARWIN-OP2 as Case Study. 1–5.
4.
Yousef, Khalil M. Ahmad, et al.. (2024). Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study. Intelligent Service Robotics. 17(4). 815–831. 1 indexed citations
5.
Abed, Sa’ed, et al.. (2023). A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives. Wireless Personal Communications. 129(3). 2079–2122. 35 indexed citations
6.
Mohd, Bassam J., et al.. (2023). Vulnerability Exploitation Using Reinforcement Learning. 281–286. 2 indexed citations
7.
Abed, Sa’ed, et al.. (2022). POSIT vs. Floating Point in Implementing IIR Notch Filter by Enhancing Radix-4 Modified Booth Multiplier. Electronics. 11(1). 163–163. 6 indexed citations
8.
Abed, Sa’ed, et al.. (2021). Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation. IET Circuits Devices & Systems. 15(2). 121–135. 7 indexed citations
9.
Mohd, Bassam J., et al.. (2019). Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. IEEE Transactions on Dependable and Secure Computing. 18(6). 2689–2704. 6 indexed citations
10.
Abed, Sa’ed, et al.. (2019). Implementation of speech feature extraction for low‐resource devices. IET Circuits Devices & Systems. 13(6). 863–872. 4 indexed citations
11.
Yousef, Khalil M. Ahmad, et al.. (2018). Analyzing Cyber-Physical Threats on Robotic Platforms. Sensors. 18(5). 1643–1643. 29 indexed citations
12.
Mohd, Bassam J. & Thaier Hayajneh. (2018). Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques. IEEE Access. 6. 35966–35978. 64 indexed citations
13.
Mohd, Bassam J., et al.. (2015). Optimization and modeling of FPGA implementation of the Katan Cipher. 29. 68–72. 11 indexed citations
14.
Mohd, Bassam J., Thaier Hayajneh, Muhammad Zeeshan Shakir, Khalid Qaraqe, & Athanasios V. Vasilakos. (2014). Energy model for light-weight block ciphers for WBAN applications. 1–4. 18 indexed citations
15.
Almashaqbeh, Ghada, Thaier Hayajneh, Athanasios V. Vasilakos, & Bassam J. Mohd. (2014). QoS-Aware Health Monitoring System Using Cloud-Based WBANs. Journal of Medical Systems. 38(10). 121–121. 52 indexed citations
16.
Mohd, Bassam J., et al.. (2013). Wavelet-transform steganography: algorithm and hardware implementation. International Journal of Electronic Security and Digital Forensics. 5(3/4). 241–241. 17 indexed citations
17.
Abed, Sa’ed, Bassam J. Mohd, Bassam Al‐Naami, & Sahel Alouneh. (2012). Design and implementation of interfacing two FPGAs. 2181. 72–77.
18.
Mohd, Bassam J., Sa’ed Abed, Thaier Hayajneh, & Sahel Alouneh. (2012). FPGA hardware of the LSB steganography method. 1–4. 26 indexed citations
19.
Mohd, Bassam J., Sa’ed Abed, Bassam Al‐Naami, & Sahel Alouneh. (2012). Image Steganography Optimization Technique. 2 indexed citations
20.
Saleh, Hani, Bassam J. Mohd, Adnan Aziz, & Earl E. Swartzlander. (2007). Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine. 7–12. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026