Остановите войну!
for scientists:
default search action
Issa M. Khalil
- > Home > Persons > Issa M. Khalil
Publications
- 2024
- [j46]Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil:
An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef). IEEE Trans. Neural Networks Learn. Syst. 35(4): 5367-5381 (2024) - 2023
- [i25]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. CoRR abs/2308.11754 (2023) - 2022
- [c47]Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My T. Thai, Xintao Wu:
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks. IEEE Big Data 2022: 1582-1587 - [i24]Phung Lai, NhatHai Phan, Abdallah Khreishah, Issa Khalil, Xintao Wu:
Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning. CoRR abs/2201.07063 (2022) - [i21]Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil:
An Adaptive Black-box Defense against Trojan Attacks (TrojDef). CoRR abs/2209.01721 (2022) - [i19]Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My Tra Thai, Xintao Wu:
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks. CoRR abs/2211.05766 (2022) - 2021
- [c43]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples. IEEE BigData 2021: 834-846 - [c42]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. CODASPY 2021: 17-27 - [c38]Fatima Alsharadgah, Abdallah Khreishah, Mahmoud Al-Ayyoub, Yaser Jararweh, Guanxiong Liu, Issa Khalil, Muhannad Almutiry, Nasir Saeed:
An Adaptive Black-box Defense against Trojan Attacks on Text Data. SNAMS 2021: 1-8 - [i18]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples. CoRR abs/2109.01275 (2021) - 2020
- [j43]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alnaeem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples. IEEE Access 8: 197086-197096 (2020) - [j41]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection. IEEE Trans. Mob. Comput. 19(4): 836-851 (2020) - [i17]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. CoRR abs/2002.09632 (2020) - [i15]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples. CoRR abs/2007.05817 (2020) - 2019
- [j39]Hazim Shakhatreh, Ahmad Sawalmeh, Ala I. Al-Fuqaha, Zuochao Dou, Eyad K. Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani:
Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access 7: 48572-48634 (2019) - [j38]Ala I. Al-Fuqaha, Ammar Gharaibeh, Ihab Mohammed, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil:
Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 20(1): 285-296 (2019) - [c35]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense. DSN Workshops 2019: 58-61 - [c34]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks. DSN 2019: 64-75 - [c33]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier. SEC 2019: 19-32 - [i12]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier. CoRR abs/1903.02585 (2019) - [i11]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks. CoRR abs/1904.08516 (2019) - [i10]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense. CoRR abs/1906.11729 (2019) - 2018
- [j36]Abdallah Khreishah, Haythem Bany Salameh, Issa Khalil, Ammar Gharaibeh:
Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks. IEEE Syst. J. 12(1): 768-777 (2018) - [j35]Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha:
Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation. IEEE Syst. J. 12(2): 1874-1885 (2018) - [j34]Zuochao Dou, Issa Khalil, Abdallah Khreishah:
A Novel and Robust Authentication Factor Based on Network Communications Latency. IEEE Syst. J. 12(4): 3279-3290 (2018) - [j33]Hazim Shakhatreh, Abdallah Khreishah, Issa Khalil:
Indoor Mobile Coverage Problem Using UAVs. IEEE Syst. J. 12(4): 3837-3848 (2018) - [c31]Sihua Shao, Abdallah Khreishah, Issa Khalil:
RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices. INFOCOM 2018: 1025-1033 - [i8]Hazim Shakhatreh, Ahmad Sawalmeh, Ala I. Al-Fuqaha, Zuochao Dou, Eyad K. Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani:
Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges. CoRR abs/1805.00881 (2018) - 2017
- [j32]Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, Ala I. Al-Fuqaha:
Smart Cities: A Survey on Data Management, Security, and Enabling Technologies. IEEE Commun. Surv. Tutorials 19(4): 2456-2501 (2017) - [j31]Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha, Mohsen Guizani:
Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection. IEEE Commun. Surv. Tutorials 19(4): 2797-2819 (2017) - [j29]Ammar Gharaibeh, Abdallah Khreishah, Mehdi Mohammadi, Ala I. Al-Fuqaha, Issa Khalil, Ammar Rayes:
Online Auction of Cloud Resources in Support of the Internet of Things. IEEE Internet Things J. 4(5): 1583-1596 (2017) - [j28]Zuochao Dou, Issa Khalil, Abdallah Khreishah:
CLAS: A Novel Communications Latency Based Authentication Scheme. Secur. Commun. Networks 2017: 4286903:1-4286903:20 (2017) - [i6]Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa Khalil:
On The Continuous Coverage Problem for a Swarm of UAVs. CoRR abs/1705.09766 (2017) - [i5]Hazim Shakhatreh, Abdallah Khreishah, Ayoub Alsarhan, Issa Khalil, Ahmad Sawalmeh, Noor Shamsiah Othman:
Efficient 3D Placement of a UAV Using Particle Swarm Optimization. CoRR abs/1705.09769 (2017) - [i4]Hazim Shakhatreh, Abdallah Khreishah, Issa Khalil:
The Indoor Mobile Coverage Problem Using UAVs. CoRR abs/1705.09771 (2017) - 2016
- [j27]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Joint Link Scheduling and Brightness Control for Greening VLC-Based Indoor Access Networks. JOCN 8(3): 148-161 (2016) - [j26]Abdallah Khreishah, Jacob Chakareski, Ammar Gharaibeh, Issa Khalil, Ali Diabat:
Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization. Simul. Model. Pract. Theory 64: 83-98 (2016) - [j25]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Distributed Online En-Route Caching. IEEE Trans. Parallel Distributed Syst. 27(12): 3455-3468 (2016) - [c27]Issa Khalil, Zuochao Dou, Abdallah Khreishah:
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected. AsiaCCS 2016: 925-930 - [c25]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil:
An O(1)-competitive online caching algorithm for content centric networking. INFOCOM 2016: 1-9 - [c24]Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa M. Khalil:
On the continuous coverage problem for a swarm of UAVs. Sarnoff Symposium 2016: 130-135 - 2015
- [j24]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Universal Network Coding-Based Opportunistic Routing for Unicast. IEEE Trans. Parallel Distributed Syst. 26(6): 1765-1774 (2015) - [j23]Ismail Omar Hababeh, Issa M. Khalil, Abdallah Khreishah:
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System. IEEE Trans. Serv. Comput. 8(1): 47-64 (2015) - [i2]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Joint Link Scheduling and Brightness Control for Greening VLC-based Indoor Access Networks. CoRR abs/1510.00026 (2015) - 2014
- [j22]Issa M. Khalil, Abdallah Khreishah, Faheem Ahmed, Khaled Shuaib:
Dependable wireless sensor networks for reliable and secure humanitarian relief applications. Ad Hoc Networks 13: 94-106 (2014) - [j21]Issa Khalil, Abdallah Khreishah, Muhammad Azeem:
Consolidated Identity Management System for secure mobile cloud computing. Comput. Networks 65: 99-110 (2014) - [j20]Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem:
Cloud Computing Security: A Survey. Comput. 3(1): 1-35 (2014) - [c23]Abdallah Khreishah, Issa Khalil, Ammar Gharaibeh, Haythem Bany Salameh, Rafe Alasem:
Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources. FiCloud 2014: 101-106 - [c22]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Asymptotically-Optimal Incentive-Based En-Route Caching Scheme. MASS 2014: 318-326 - [c21]Issa M. Khalil, Zuochao Dou, Abdallah Khreishah:
TPM-Based Authentication Mechanism for Apache Hadoop. SecureComm (1) 2014: 105-122 - [i1]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Asymptotically-Optimal Incentive-Based En-Route Caching Scheme. CoRR abs/1404.4639 (2014) - 2013
- [j19]Ismail Omar Hababeh, Issa Khalil, Abdallah Khreishah, Samir Bataineh:
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks. J. Comput. Sci. 9(12): 1626-1637 (2013) - [j16]Abdallah Khreishah, Issa Khalil, Jie Wu:
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 24(10): 2015-2024 (2013) - [c20]Issa M. Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad:
Security Concerns in Cloud Computing. ITNG 2013: 411-416 - 2012
- [j15]Issa Khalil, Mamoun A. Awad, Abdallah Khreishah:
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks. Comput. Networks 56(14): 3300-3317 (2012) - [j13]Issa M. Khalil, Yasser Gadallah, Mohammad Hayajneh, Abdallah Khreishah:
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks. Sensors 12(7): 8782-8805 (2012) - [j11]Abdallah Khreishah, Issa M. Khalil, Pouya Ostovari, Jie Wu:
Flow-based XOR Network Coding for Lossy Wireless Networks. IEEE Trans. Wirel. Commun. 11(6): 2321-2329 (2012) - [c18]Issa M. Khalil, Abdallah Khreishah:
On the analysis of identity delegation attacks. ICNC 2012: 990-994 - [c17]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Distributed network coding-based opportunistic routing for multicast. MobiHoc 2012: 115-124 - [c16]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Universal opportunistic routing scheme using network coding. SECON 2012: 353-361 - 2011
- [c15]Abdallah Khreishah, Jie Wu, Pouya Ostovari, Issa M. Khalil:
Flow Based XOR Network Coding for Lossy Wireless Networks. GLOBECOM 2011: 1-5 - [c14]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks. MASS 2011: 391-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 18:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint