Research Output

Filter
Conference contribution
2019

Analyzing subgraph statistics from extended local views with decentralized differential privacy

Sun, H., Xiao, X., Khalil, I., Yang, Y., Qin, Z., Wang, H. & Yu, T., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 703-717 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Citations (Scopus)

BlockTag: Design and applications of a tagging system for blockchain analysis

Boshmaf, Y., Jawaheri, H. A. & Sabah, M. A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 299-313 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Empirical performance evaluation of QUIC protocol for Tor anonymity network

Basyoni, L., Erbad, A., Alsabah, M., Fetais, N. & Guizani, M., Jun 2019, 2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019. Institute of Electrical and Electronics Engineers Inc., p. 635-642 8 p. 8766609. (2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GanDef: A GAN based adversarial training defense for neural network classifier

Liu, G., Khalil, I. & Khreishah, A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 19-32 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Optimizing cross-platform data movement

Kruse, S., Kaoudi, Z., Quiane-Ruiz, J. A., Chawla, S., Naumann, F. & Contreras-Rojas, B., Apr 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 1642-1645 4 p. 8731354. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks

Zhauniarovich, Y. & Dodia, P., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 142-150 9 p. 8806653. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy

Sun, H., Dong, B., Wang, H. W., Yu, T. & Qin, Z., 22 Jan 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 488-497 10 p. 8622635. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Using intuition from empirical properties to simplify adversarial training defense

Liu, G., Khalil, I. & Khreishah, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2019. Institute of Electrical and Electronics Engineers Inc., p. 58-61 4 p. 8806015. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks

Liu, G., Khalil, I. & Khreishah, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 64-75 12 p. 8809515. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I. M., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 330-341 12 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Cross-platform data processing: Use cases and challenges

Kaoudi, Z. & Quiane-Ruiz, J. A., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1723-1726 4 p. 8509444. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Enabling GPU-assisted antivirus protection on android devices through edge offloading

Deyannis, D., Tsirbas, R., Vasiliadis, G., Montella, R., Kosta, S. & Ioannidis, S., 10 Jun 2018, EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018. Association for Computing Machinery, Inc, p. 13-18 6 p. (EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
7 Citations (Scopus)

RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices

Shao, S., Khreishah, A. & Khalil, I., 8 Oct 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1025-1033 9 p. 8485817

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Securing named data networks: Challenges and theway forward

Bertino, E. & Nabeel, M., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 51-59 9 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source attribution of cryptographic API misuse in android applications

Muslukhov, I., Boshmaf, Y. & Beznosov, K., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 133-146 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2017

A cost-based optimizer for gradient descent optimization

Kaoudi, Z., Quiané-Ruiz, J. A., Thirumuruganathan, S., Chawla, S. & Agrawal, D., 9 May 2017, SIGMOD 2017 - Proceedings of the 2017 ACM International Conference on Management of Data. Association for Computing Machinery, p. 977-992 16 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data; vol. Part F127746).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

A minorization-maximization algorithm for an-based mimome secrecy rate maximization

Masood, M., Ghrayeb, A., Babu, P., Khalil, I. & Hasna, M., 19 Apr 2017, 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 975-980 6 p. 7905987. (2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A rigorous and efficient run-time security monitor for real-time critical embedded system applications

Khan, M. T., Serpanos, D. & Shrobe, H., 6 Feb 2017, 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016. Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 7845510. (2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Differentially private k-skyband query answering through adaptive spatial decomposition

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 142-163 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Distributed Cardinality Estimation of Set Operations with Differential Privacy

Stanojevic, R., Nabeel, M. & Yu, T., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 37-48 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Efficient 3D placement of a UAV using particle swarm optimization

Shakhatreh, H., Khreishah, A., Alsarhan, A., Khalil, I., Sawalmeh, A. & Othman, N. S., 8 May 2017, 2017 8th International Conference on Information and Communication Systems, ICICS 2017. Institute of Electrical and Electronics Engineers Inc., p. 258-263 6 p. 7921981

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Exact detection of information leakage: Decidability and complexity

Chirkova, R. & Yu, T., 1 Jan 2017, Transactions on Large-Scale Data- and Knowledge- Centered Systems XXXII - Special Issue on Big Data Analytics and Knowledge Discovery. Springer Verlag, p. 1-23 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10420 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Generating synthetic decentralized social graphs with local differential privacy

Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X. & Ren, K., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 425-438 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

37 Citations (Scopus)

No sugar but all the taste! Memory encryption without architectural support

Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E. & Ioannidis, S., 1 Jan 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 362-380 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

On the continuous coverage problem for a swarm of UAVs

Shakhatreh, H., Khreishah, A., Chakareski, J., Salameh, H. B. & Khalil, I., 7 Feb 2017, 37th IEEE Sarnoff Symposium, Sarnoff 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 7846742

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors

Buriro, A., Crispo, B. & Zhauniarovich, Y., 13 Jun 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017. Institute of Electrical and Electronics Engineers Inc., 7947684. (2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Profiling DRDoS attacks with data analytics pipeline

Berti-Equille, L. & Zhauniarovich, Y., 6 Nov 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1983-1986 4 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

The Many Faces of End-to-End Encryption and Their Security Analysis

Nabeel, M., 7 Sep 2017, Proceedings - 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017. Goscinski, A. M. & Luo, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 8029288. (Proceedings - 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

A design study to identify inconsistencies in kinship information: The case of the 1000 Genomes project

Aupetit, M., Ullah, E., Rawi, R. & Bensmail, H., 4 May 2016, 2016 IEEE Pacific Visualization Symposium, PacificVis 2016 - Proceedings. IEEE Computer Society, Vol. 2016-May. p. 254-258 5 p. 7465281

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

An O(1)-competitive online caching algorithm for content centric networking

Gharaibeh, A., Khreishah, A. & Khalil, I., 27 Jul 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Discovering malicious domains through passive DNS data graph analysis

Khalil, I., Yu, T. & Guan, B., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 663-674 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Evaluation of resource-based app repackaging detection in android

Gadyatskaya, O., Lezza, A. L. & Zhauniarovich, Y., 1 Jan 2016, Secure IT Systems - 21st Nordic Conference, NordSec 2016, Proceedings. Springer Verlag, p. 135-151 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10014 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

GRIM: Leveraging GPUs for Kernel integrity monitoring

Koromilas, L., Vasiliadis, G., Athanasopoulos, E. & Ioannidis, S., 1 Jan 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Harvesting the low-hanging fruits: Defending against automated large-scale cyber-intrusions by focusing on the vulnerable population

Halawa, H., Beznosov, K., Boshmaf, Y., Coskun, B., Ripeanu, M. & Santos-Neto, E., 26 Sep 2016, NSPW 2016 - Proceedings of the 2016 New Security Paradigms Workshop. Association for Computing Machinery, p. 11-22 12 p. (ACM International Conference Proceeding Series; vol. 26-29-September-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Heavy hitter estimation over set-valued data with local differential privacy

Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X. & Ren, K., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016. p. 192-203 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

94 Citations (Scopus)

Privacy-preserving two-party skyline queries over horizontally partitioned data

Chen, L., Yu, T. & Chirkova, R., 2016, Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Proceedings. Springer Verlag, Vol. 9895 LNCS. p. 187-203 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9895 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Publishing attributed social graphs with formal privacy guarantees

Jorgensen, Z., Yu, T. & Cormode, G., 26 Jun 2016, SIGMOD 2016 - Proceedings of the 2016 International Conference on Management of Data. Association for Computing Machinery, Vol. 26-June-2016. p. 107-122 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

PVSAE: A public verifiable searchable encryption service framework for outsourced encrypted data

Zhang, R., Xue, R., Yu, T. & Liu, L., 31 Aug 2016, Proceedings - 2016 IEEE International Conference on Web Services, ICWS 2016. Institute of Electrical and Electronics Engineers Inc., p. 428-435 8 p. 7558031

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

RDFind: Scalable conditional inclusion dependency discovery in RDF datasets

Kruse, S., Jentzsch, A., Papenbrock, T., Kaoudi, Z., Quiane Ruiz, J. A. & Naumann, F., 26 Jun 2016, SIGMOD 2016 - Proceedings of the 2016 International Conference on Management of Data. Association for Computing Machinery, Vol. 26-June-2016. p. 953-967 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Rheem: Enabling multi-platform task execution

Agrawal, D., Ba, L., Berti-Equille, L., Chawla, S., Elmagarmid, A., Hammady, H., Idris, Y., Kaoudi, Z., Khayyat, Z., Kruse, S., Ouzzani, M., Papotti, P., Quiané-Ruiz, J. A., Tang, N. & Zaki, M. J., 26 Jun 2016, SIGMOD 2016 - Proceedings of the 2016 International Conference on Management of Data. Association for Computing Machinery, p. 2069-2072 4 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data; vol. 26-June-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Road to freedom in big data analytics

Agrawal, D., Chawla, S., Elmagarmid, A., Kaoudi, Z., Ouzzani, M., Papotti, P., Quiané-Ruiz, J. A., Tang, N. & Zaki, M. J., 1 Jan 2016, Advances in Database Technology - EDBT 2016: 19th International Conference on Extending Database Technology, Proceedings. Manolescu, I., Pitoura, E., Marian, A., Maabout, S., Tanca, L., Koutrika, G. & Stefanidis, K. (eds.). OpenProceedings.org, p. 479-484 6 p. (Advances in Database Technology - EDBT; vol. 2016-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Secure inter cloud data migration

Khalil, I., Hababeh, I. & Khreishah, A., 20 May 2016, 2016 7th International Conference on Information and Communication Systems, ICICS 2016. Institute of Electrical and Electronics Engineers Inc., p. 62-67 6 p. 7476087

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Small changes, big changes: An updated view on the android permission system

Zhauniarovich, Y. & Gadyatskaya, O., 1 Jan 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, p. 346-367 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Visualization of actionable knowledge to mitigate DRDoS attacks

Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., 8 Nov 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739577

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Your credentials are compromised, do not panic: You can be well protected

Khalil, I., Dou, Z. & Khreishah, A., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 925-930 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2015

Abstract data machine: Data classifier for reliable embedded systems software

Khan, M. T., Fragopoulos, A., Shrobe, H. & Serpanos, D., 4 Oct 2015, Proceedings of the 10th Workshop on Embedded Systems Security, WESS 2015. Association for Computing Machinery, Inc, a8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A low-latency, low-area hardware oblivious RAM controller

Fletcher, C. W., Ren, L., Kwon, A., Van Dijk, M., Stefanov, E., Serpanos, D. & Devadas, S., 15 Jul 2015, Proceedings - 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2015. Institute of Electrical and Electronics Engineers Inc., p. 215-222 8 p. 7160074. (Proceedings - 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

AMAL: High-fidelity, behavior-based automated malware analysis and classification

Mohaisen, A. & Alrawi, O., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Springer Verlag, Vol. 8909. p. 107-121 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Asymptotically-optimal incentive-based en-route caching scheme

Gharaibeh, A., Khreishah, A., Khalil, I. & Wu, J., 6 Feb 2015, Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., p. 318-326 9 p. 7035700. (Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems

Gao, S., Xie, L., Solar-Lezama, A., Serpanos, D. & Shrobe, H., 8 Feb 2015, 54rd IEEE Conference on Decision and Control,CDC 2015. Institute of Electrical and Electronics Engineers Inc., p. 2613-2620 8 p. 7402610. (Proceedings of the IEEE Conference on Decision and Control; vol. 54rd IEEE Conference on Decision and Control,CDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)