Research Output

2020

Enabling Real-Time Indoor Tracking of IoT Devices through Visible Light Retroreflection

Shao, S., Khreishah, A. & Khalil, I., 1 Apr 2020, In : IEEE Transactions on Mobile Computing. 19, 4, p. 836-851 16 p., 8654691.

Research output: Contribution to journalArticle

1 Citation (Scopus)

RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems

Kruse, S., Kaoudi, Z., Contreras-Rojas, B., Chawla, S., Naumann, F. & Quiane Ruiz, J. A., 1 Jan 2020, (Accepted/In press) In : VLDB Journal.

Research output: Contribution to journalArticle

Open Access

StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications

Ahmad, M., Costamagna, V., Crispo, B., Bergadano, F. & Zhauniarovich, Y., Jan 2020, In : Journal of Systems and Software. 159, 110386.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

Analyzing subgraph statistics from extended local views with decentralized differential privacy

Sun, H., Xiao, X., Khalil, I., Yang, Y., Qin, Z., Wang, H. & Yu, T., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 703-717 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Citations (Scopus)

An integrated methodology for big data classification and security for improving cloud systems data mobility

Hababeh, I., Gharaibeh, A., Nofal, S. & Khalil, I., 1 Jan 2019, In : IEEE Access. 7, p. 9153-9163 11 p., 8594554.

Research output: Contribution to journalArticle

3 Citations (Scopus)

BlockTag: Design and applications of a tagging system for blockchain analysis

Boshmaf, Y., Jawaheri, H. A. & Sabah, M. A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 299-313 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Empirical performance evaluation of QUIC protocol for Tor anonymity network

Basyoni, L., Erbad, A., Alsabah, M., Fetais, N. & Guizani, M., Jun 2019, 2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019. Institute of Electrical and Electronics Engineers Inc., p. 635-642 8 p. 8766609. (2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GanDef: A GAN based adversarial training defense for neural network classifier

Liu, G., Khalil, I. & Khreishah, A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 19-32 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Optimizing cross-platform data movement

Kruse, S., Kaoudi, Z., Quiane-Ruiz, J. A., Chawla, S., Naumann, F. & Contreras-Rojas, B., Apr 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 1642-1645 4 p. 8731354. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks

Zhauniarovich, Y. & Dodia, P., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 142-150 9 p. 8806653. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy

Sun, H., Dong, B., Wang, H. W., Yu, T. & Qin, Z., 22 Jan 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 488-497 10 p. 8622635. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges

Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., Othman, N. S., Khreishah, A. & Guizani, M., 1 Jan 2019, In : IEEE Access. 7, p. 48572-48634 63 p., 8682048.

Research output: Contribution to journalReview article

72 Citations (Scopus)

Using intuition from empirical properties to simplify adversarial training defense

Liu, G., Khalil, I. & Khreishah, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2019. Institute of Electrical and Electronics Engineers Inc., p. 58-61 4 p. 8806015. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks

Liu, G., Khalil, I. & Khreishah, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 64-75 12 p. 8809515. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I. M., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 330-341 12 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

17 Citations (Scopus)

Cross-platform data processing: Use cases and challenges

Kaoudi, Z. & Quiane-Ruiz, J. A., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1723-1726 4 p. 8509444. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Enabling GPU-assisted antivirus protection on android devices through edge offloading

Deyannis, D., Tsirbas, R., Vasiliadis, G., Montella, R., Kosta, S. & Ioannidis, S., 10 Jun 2018, EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018. Association for Computing Machinery, Inc, p. 13-18 6 p. (EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
7 Citations (Scopus)

Indoor Mobile Coverage Problem Using UAVs

Shakhatreh, H., Khreishah, A. & Khalil, I., 28 Apr 2018, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

9 Citations (Scopus)

K-Skyband query answering with differential privacy1

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2018, In : Journal of Computer Security. 26, 5, p. 647-676 30 p.

Research output: Contribution to journalArticle

Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks

Al-Fuqaha, A., Gharaibeh, A., Mohammed, I., Hussini, S. J., Khreishah, A. & Khalil, I., 14 Mar 2018, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

2 Citations (Scopus)

RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices

Shao, S., Khreishah, A. & Khalil, I., 8 Oct 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1025-1033 9 p. 8485817

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

RHEEM: Enabling cross platform data processing

Agrawal, D., Chawla, S., Contreras-Rojas, B., Elmagarmid, A., Idris, Y., Kaoudi, Z., Kruse, S., Lucas, J., Mansour, E., Ouzzani, M., Papotti, P., Quiane´-Ruiz, J. A., Tang, N., Thirumuruganathan, S. & Troudi, A., 1 Jan 2018, In : Proceedings of the VLDB Endowment. 11, 11, p. 1414-1427 14 p.

Research output: Contribution to journalConference article

8 Citations (Scopus)

Robust insider attacks countermeasure for hadoop: Design and implementation

Dou, Z., Khalil, I., Khreishah, A. & Al-Fuqaha, A., Jun 2018, In : IEEE Systems Journal. 12, 2, p. 1874-1885 12 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Sealing ability of Biodentine versus ProRoot mineral trioxide aggregate as root-end filling materials

Nabeel, M., Tawfik, H. M., Abu-Seida, A. M. A. & Elgendy, A. A., 1 Jan 2018, (Accepted/In press) In : Saudi Dental Journal.

Research output: Contribution to journalArticle

Securing named data networks: Challenges and theway forward

Bertino, E. & Nabeel, M., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 51-59 9 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source attribution of cryptographic API misuse in android applications

Muslukhov, I., Boshmaf, Y. & Beznosov, K., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 133-146 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Your culture is in your password: An analysis of a demographically-diverse password dataset

Alsabah, M., Oligeri, G. & Riley, R., 1 Aug 2018, In : Computers and Security. 77, p. 427-441 15 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2017

A cost-based optimizer for gradient descent optimization

Kaoudi, Z., Quiané-Ruiz, J. A., Thirumuruganathan, S., Chawla, S. & Agrawal, D., 9 May 2017, SIGMOD 2017 - Proceedings of the 2017 ACM International Conference on Management of Data. Association for Computing Machinery, p. 977-992 16 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data; vol. Part F127746).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

A minorization-maximization algorithm for an-based mimome secrecy rate maximization

Masood, M., Ghrayeb, A., Babu, P., Khalil, I. & Hasna, M., 19 Apr 2017, 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 975-980 6 p. 7905987. (2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A Minorization-Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel

Masood, M., Ghrayeb, A., Babu, P., Khalil, I. & Hasna, M., Mar 2017, In : IEEE Communications Letters. 21, 3, p. 520-523 4 p., 7776840.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A Novel and Robust Authentication Factor Based on Network Communications Latency

Dou, Z., Khalil, I. & Khreishah, A., 24 Apr 2017, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

A rigorous and efficient run-time security monitor for real-time critical embedded system applications

Khan, M. T., Serpanos, D. & Shrobe, H., 6 Feb 2017, 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016. Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 7845510. (2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

CLAS: A Novel Communications Latency Based Authentication Scheme

Dou, Z., Khalil, I. & Khreishah, A., 1 Jan 2017, In : Security and Communication Networks. 2017, 4286903.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Context-aware RAON middleware for opportunistic network

Lau, G., Alsabah, M., Jaseemuddin, M., Razavi, H. & Bhuiyan, M., 1 Oct 2017, In : Pervasive and Mobile Computing. 41, p. 28-45 18 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Design and Implementation of a Stateful Network Packet Processing Framework for GPUs

Vasiliadis, G., Koromilas, L., Polychronakis, M. & Ioannidis, S., 1 Feb 2017, In : IEEE/ACM Transactions on Networking. 25, 1, p. 610-623 14 p., 7551177.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis

Choo, E., Yu, T. & Chi, M., 1 Jan 2017, In : Journal of Computer Security. 25, 3, p. 283-318 36 p.

Research output: Contribution to journalReview article

3 Citations (Scopus)

Differentially private k-skyband query answering through adaptive spatial decomposition

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 142-163 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Distributed Cardinality Estimation of Set Operations with Differential Privacy

Stanojevic, R., Nabeel, M. & Yu, T., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 37-48 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Efficient 3D placement of a UAV using particle swarm optimization

Shakhatreh, H., Khreishah, A., Alsarhan, A., Khalil, I., Sawalmeh, A. & Othman, N. S., 8 May 2017, 2017 8th International Conference on Information and Communication Systems, ICICS 2017. Institute of Electrical and Electronics Engineers Inc., p. 258-263 6 p. 7921981

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures

Papadogiannaki, E., Koromilas, L., Vasiliadis, G. & Ioannidis, S., 27 Jan 2017, (Accepted/In press) In : IEEE/ACM Transactions on Networking.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Exact detection of information leakage: Decidability and complexity

Chirkova, R. & Yu, T., 1 Jan 2017, Transactions on Large-Scale Data- and Knowledge- Centered Systems XXXII - Special Issue on Big Data Analytics and Knowledge Discovery. Springer Verlag, p. 1-23 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10420 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Generating synthetic decentralized social graphs with local differential privacy

Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X. & Ren, K., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 425-438 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

37 Citations (Scopus)

No sugar but all the taste! Memory encryption without architectural support

Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E. & Ioannidis, S., 1 Jan 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 362-380 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Online Auction of Cloud Resources in Support of the Internet of Things

Gharaibeh, A., Khreishah, A., Mohammadi, M., Al-Fuqaha, A., Khalil, I. & Rayes, A., 1 Oct 2017, In : IEEE Internet of Things Journal. 4, 5, p. 1583-1596 14 p., 7972940.

Research output: Contribution to journalArticle

7 Citations (Scopus)

On the continuous coverage problem for a swarm of UAVs

Shakhatreh, H., Khreishah, A., Chakareski, J., Salameh, H. B. & Khalil, I., 7 Feb 2017, 37th IEEE Sarnoff Symposium, Sarnoff 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 7846742

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors

Buriro, A., Crispo, B. & Zhauniarovich, Y., 13 Jun 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017. Institute of Electrical and Electronics Engineers Inc., 7947684. (2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Preface

Dacier, M. & Bailey, M., 1 Jan 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10453 LNCS, p. V-VI

Research output: Contribution to journalEditorial

PriviPK: Certificate-less and secure email communication

Alsabah, M., Tomescu, A., Lebedev, I., Serpanos, D. & Devadas, S., 1 Sep 2017, In : Computers and Security. 70, p. 1-15 15 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Profiling DRDoS attacks with data analytics pipeline

Berti-Equille, L. & Zhauniarovich, Y., 6 Nov 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1983-1986 4 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)