default search action
Abdallah Khreishah
Person information
- affiliation: New Jersey Institute of Technology, Newark, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Ali Hamdan Alenezi, Mahmoud Nazzal, Ahmed Sawalmeh, Abdallah Khreishah, Sihua Shao, Muhannad Almutiry:
Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning. Clust. Comput. 27(1): 299-311 (2024) - [j69]Rami Al-Jarrah, Hitham Tlilan, Abdallah Khreishah:
Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading. Clust. Comput. 27(3): 3055-3073 (2024) - [j68]Conrado P. Vizcarra, Shadan Alhamed, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Nura Aljaafari, Ahmad Sawalmeh, Mahmoud Nazzal, Abdallah Khreishah, Abdulaziz Alhumam, Muhammad Anan:
Deep learning adversarial attacks and defenses on license plate recognition system. Clust. Comput. 27(8): 11627-11644 (2024) - [j67]Nura Aljaafari, Mahmoud Nazzal, Ahmad H. Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Abdulaziz Al Naeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra:
Investigating the Factors Impacting Adversarial Attack and Defense Performances in Federated Learning. IEEE Trans. Engineering Management 71: 12542-12555 (2024) - [j66]Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil:
An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef). IEEE Trans. Neural Networks Learn. Syst. 35(4): 5367-5381 (2024) - [c67]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). CCS 2024: 2266-2280 - [c66]Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen:
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. CCS 2024: 5078-5080 - [c65]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. SP 2024: 1236-1254 - [i35]Mahmoud Nazzal, Deepak Vungarala, Mehrdad Morsali, Chao Zhang, Arnob Ghosh, Abdallah Khreishah, Shaahin Angizi:
A Dataset for Large Language Model-Driven AI Accelerator Generation. CoRR abs/2404.10875 (2024) - [i34]Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen:
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. CoRR abs/2409.07368 (2024) - [i33]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). CoRR abs/2409.12699 (2024) - 2023
- [j65]Yunseong Lee, Taeyun Ha, Abdallah Khreishah, Wonjong Noh, Sungrae Cho:
Delay-Controlled Bidirectional Traffic Setup Scheme to Enhance the Network Coding Opportunity in Real-Time Industrial IoT Networks. IEEE Internet Things J. 10(12): 10559-10574 (2023) - [j64]Sihua Shao, Adrian Salustri, Abdallah Khreishah, Chenren Xu, Shuai Ma:
R-VLCP: Channel Modeling and Simulation in Retroreflective Visible Light Communication and Positioning Systems. IEEE Internet Things J. 10(13): 11429-11439 (2023) - [j63]Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala I. Al-Fuqaha, Abdallah Khreishah, Abdulelah Abdallah Algosaibi:
Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions. IEEE Trans. Comput. Soc. Syst. 10(6): 3089-3108 (2023) - [c64]Mahmoud Nazzal, Nura Aljaafari, Ahmad H. Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed:
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification. FMEC 2023: 204-209 - [c63]Mehrdad Morsali, Mahmoud Nazzal, Abdallah Khreishah, Shaahin Angizi:
IMA-GNN: In-Memory Acceleration of Centralized and Decentralized Graph Neural Networks at the Edge. ACM Great Lakes Symposium on VLSI 2023: 3-8 - [c62]Abdallah Khreishah:
Keynote Speech 3: Beyond securing networks and storage: emerging attacks and defences to machine intelligence. IOTSMS 2023: 4-5 - [c61]Guanxiong Liu, Nicholas Furth, Hang Shi, Abdallah Khreishah, Joyoung Lee, Nirwan Ansari, Chengjun Liu, Yaser Jararweh:
Federated Learning Aided Deep Convolutional Neural Network Solution for Smart Traffic Management. NOMS 2023: 1-8 - [c60]Abdallah Khreishah:
Beyond Securing Networks and Storage: Emerging Attacks and Defences to Machine Intelligence. SDS 2023: 4-5 - [i32]Mahmoud Nazzal, Abdallah Khreishah, Joyoung Lee, Shaahin Angizi, Ala I. Al-Fuqaha, Mohsen Guizani:
Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach. CoRR abs/2303.00524 (2023) - [i31]Mehrdad Morsali, Mahmoud Nazzal, Abdallah Khreishah, Shaahin Angizi:
IMA-GNN: In-Memory Acceleration of Centralized and Decentralized Graph Neural Networks at the Edge. CoRR abs/2303.14162 (2023) - [i30]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. CoRR abs/2308.11754 (2023) - [i29]Mahmoud Nazzal, Nura Aljaafari, Ahmad Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed:
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification. CoRR abs/2310.06855 (2023) - 2022
- [j62]Izzat Alsmadi, Nura Aljaafari, Mahmoud Nazzal, Shadan Alhamed, Ahmad H. Sawalmeh, Conrado P. Vizcarra, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Abdulaziz Al Naeem, Adel Aldalbahi, Abdulaziz Al-Humam:
Adversarial Machine Learning in Text Processing: A Literature Survey. IEEE Access 10: 17043-17077 (2022) - [j61]Sihua Shao, Mahmoud Nazzal, Abdallah Khreishah, Moussa Ayyash:
Self-Optimizing Data Offloading in Mobile Heterogeneous Radio-Optical Networks: A Deep Reinforcement Learning Approach. IEEE Netw. 36(2): 100-106 (2022) - [j60]Ahmad Sawalmeh, Noor Shamsiah Othman, Guanxiong Liu, Abdallah Khreishah, Ali Hamdan Alenezi, Abdulaziz Alanazi:
Power-Efficient Wireless Coverage Using Minimum Number of UAVs. Sensors 22(1): 223 (2022) - [j59]Guanxiong Liu, Hang Shi, Abbas Kiani, Abdallah Khreishah, Joyoung Lee, Nirwan Ansari, Chengjun Liu, Mustafa Mohammad Yousef:
Smart Traffic Monitoring System Using Computer Vision and Edge Computing. IEEE Trans. Intell. Transp. Syst. 23(8): 12027-12038 (2022) - [j58]Ammar Latif, Rahul Parameswaran, Sachin Vishwarupe, Abdallah Khreishah, Yaser Jararweh, Ali Hamdan Alenezi:
MediaFlow: Multicast Routing and In-Network Monitoring for Professional Media Production. IEEE Trans. Netw. Serv. Manag. 19(2): 1862-1875 (2022) - [c59]Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My T. Thai, Xintao Wu:
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks. IEEE Big Data 2022: 1582-1587 - [c58]Emily Lattanzio, Ranyang Zhou, Arman Roohi, Abdallah Khreishah, Durga Misra, Shaahin Angizi:
Toward a Behavioral-Level End-to-End Framework for Silicon Photonics Accelerators. IGSC 2022: 1-6 - [c57]Nicholas Furth, Abdallah Khreishah, Guanxiong Liu, NhatHai Phan, Yaser Jararweh:
Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness. SDS 2022: 1-9 - [i28]Phung Lai, NhatHai Phan, Abdallah Khreishah, Issa Khalil, Xintao Wu:
Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning. CoRR abs/2201.07063 (2022) - [i27]Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil:
An Adaptive Black-box Defense against Trojan Attacks (TrojDef). CoRR abs/2209.01721 (2022) - [i26]Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My Tra Thai, Xintao Wu:
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks. CoRR abs/2211.05766 (2022) - 2021
- [j57]Sihua Shao, Abdallah Khreishah, Moussa Ayyash:
Evaluating the feasibility of random waypoint model for indoor wireless networks. Internet Technol. Lett. 4(2) (2021) - [c56]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples. IEEE BigData 2021: 834-846 - [c55]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. CODASPY 2021: 17-27 - [c54]Fatima Alsharadgah, Abdallah Khreishah, Mahmoud Al-Ayyoub, Yaser Jararweh, Guanxiong Liu, Issa Khalil, Muhannad Almutiry, Nasir Saeed:
An Adaptive Black-box Defense against Trojan Attacks on Text Data. SNAMS 2021: 1-8 - [i25]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples. CoRR abs/2109.01275 (2021) - [i24]Guanxiong Liu, Hang Shi, Abbas Kiani, Abdallah Khreishah, Joyoung Lee, Nirwan Ansari, Chengjun Liu, Mustafa Yousef:
Smart Traffic Monitoring System using Computer Vision and Edge Computing. CoRR abs/2109.03141 (2021) - [i23]Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala I. Al-Fuqaha, Abdallah Khreishah, Abdulelah Abdallah Algosaibi:
Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions. CoRR abs/2110.13980 (2021) - 2020
- [j56]Sang-Min Choi, Kiyoung Jang, Tae-Dong Lee, Abdallah Khreishah, Wonjong Noh:
Alleviating Item-Side Cold-Start Problems in Recommender Systems Using Weak Supervision. IEEE Access 8: 167747-167756 (2020) - [j55]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alnaeem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples. IEEE Access 8: 197086-197096 (2020) - [j54]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection. IEEE Trans. Mob. Comput. 19(4): 836-851 (2020) - [j53]Sihua Shao, Abdallah Khreishah:
Harnessing retroreflective transportation infrastructure for intelligent vehicle positioning. Veh. Commun. 24: 100246 (2020) - [i22]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. CoRR abs/2002.09632 (2020) - [i21]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples. CoRR abs/2007.05817 (2020)
2010 – 2019
- 2019
- [j52]Hazim Shakhatreh, Ahmad Sawalmeh, Ala I. Al-Fuqaha, Zuochao Dou, Eyad K. Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani:
Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access 7: 48572-48634 (2019) - [j51]Ahmad H. Sawalmeh, Noor Shamsiah Othman, Hazim Shakhatreh, Abdallah Khreishah:
Wireless Coverage for Mobile Users in Dynamic Environments Using UAV. IEEE Access 7: 126376-126390 (2019) - [j50]Michael B. Rahaim, Iman Abdalla, Moussa Ayyash, Hany Elgala, Abdallah Khreishah, Thomas D. C. Little:
Welcome to the CROWD: Design Decisions for Coexisting Radio and Optical Wireless Deployments. IEEE Netw. 33(5): 174-182 (2019) - [j49]Hazim Shakhatreh, Abdallah Khreishah, Bo Ji:
UAVs to the Rescue: Prolonging the Lifetime of Wireless Devices Under Disaster Situations. IEEE Trans. Green Commun. Netw. 3(4): 942-954 (2019) - [j48]Ala I. Al-Fuqaha, Ammar Gharaibeh, Ihab Mohammed, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil:
Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 20(1): 285-296 (2019) - [j47]Ammar Latif, Pradeep Kathail, Sachin Vishwarupe, Subha Dhesikan, Abdallah Khreishah, Yaser Jararweh:
Multicast Optimization for CLOS Fabric in Media Data Centers. IEEE Trans. Netw. Serv. Manag. 16(4): 1855-1868 (2019) - [j46]Abbas Kiani, Nirwan Ansari, Abdallah Khreishah:
Hierarchical Capacity Provisioning for Fog Computing. IEEE/ACM Trans. Netw. 27(3): 962-971 (2019) - [c53]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense. DSN Workshops 2019: 58-61 - [c52]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks. DSN 2019: 64-75 - [c51]Sihua Shao, Zareen Khan, Guanxiong Liu, Abdallah Khreishah, Moussa Ayyash, Hany Elgala, Thomas D. C. Little, Michael B. Rahaim:
Poster Abstract: Optimizing Handover Parameters by Q-learning for Heterogeneous RF-VLC Networks. INFOCOM Workshops 2019: 1069-1070 - [c50]Sihua Shao, Abdallah Khreishah, Juan Paez:
PassiveRETRO: Enabling Completely Passive Visible Light Localization for IoT Applications. INFOCOM 2019: 1540-1548 - [c49]Monette H. Khadr, Hany Elgala, Moussa Ayyash, Thomas D. C. Little, Michael B. Rahaim, Abdallah Khreishah:
Technology Independent Security Aware OFDM (SA-OFDM). PIMRC 2019: 1-6 - [c48]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier. SEC 2019: 19-32 - [i20]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier. CoRR abs/1903.02585 (2019) - [i19]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks. CoRR abs/1904.08516 (2019) - [i18]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense. CoRR abs/1906.11729 (2019) - 2018
- [j45]Izzat Alsmadi, Abdallah Khreishah, Dianxiang Xu:
Network slicing to improve multicasting in HPC clusters. Clust. Comput. 21(3): 1493-1506 (2018) - [j44]Mehrdad Djavid, Mohammad Hadi Tavakoli Dastjerdi, Moab Rajan Philip, Dipayan Datta Choudhary, Thi Tan Pham, Abdallah Khreishah, Hieu Pham Trung Nguyen:
Photonic crystal-based permutation switch for optical networks. Photonic Netw. Commun. 35(1): 90-96 (2018) - [j43]Abdallah Khreishah, Haythem Bany Salameh, Issa Khalil, Ammar Gharaibeh:
Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks. IEEE Syst. J. 12(1): 768-777 (2018) - [j42]Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha:
Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation. IEEE Syst. J. 12(2): 1874-1885 (2018) - [j41]Zuochao Dou, Issa Khalil, Abdallah Khreishah:
A Novel and Robust Authentication Factor Based on Network Communications Latency. IEEE Syst. J. 12(4): 3279-3290 (2018) - [j40]Hazim Shakhatreh, Abdallah Khreishah, Issa Khalil:
Indoor Mobile Coverage Problem Using UAVs. IEEE Syst. J. 12(4): 3837-3848 (2018) - [j39]Abdallah Khreishah, Sihua Shao, Ammar Gharaibeh, Moussa Ayyash, Hany Elgala, Nirwan Ansari:
A Hybrid RF-VLC System for Energy Efficient Wireless Access. IEEE Trans. Green Commun. Netw. 2(4): 932-944 (2018) - [c47]Ammar Latif, Roshini Paul, Rishi Chhibber, Anand Singh, Rahul Parameswaran, Abdallah Khreishah, Yaser Jararweh:
DiRP: Distributed Intelligent Rendezvous Point for Multicast Control Plane. IGSC 2018: 1-6 - [c46]Mohammad Wardat, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdallah A. Khreishah:
Cloud data centers revenue maximization using server consolidation: Modeling and evaluation. INFOCOM Workshops 2018: 172-177 - [c45]Sihua Shao, Hanbin Zhang, Dimitrios Koutsonikolas, Abdallah Khreishah:
Two-dimensional reduction of beam training overhead in crowded 802.11ad based networks. INFOCOM Workshops 2018: 680-685 - [c44]Sihua Shao, Abdallah Khreishah, Issa Khalil:
RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices. INFOCOM 2018: 1025-1033 - [c43]Abbas Kiani, Guanxiong Liu, Hang Shi, Abdallah Khreishah, Nirwan Ansari, Joyoung Lee, Chengjun Liu:
A Two-Tier Edge Computing Based Model for Advanced Traffic Detection. IoTSMS 2018: 208-215 - [c42]Zhouchi Li, Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Iman Abdalla, Hany Elgala, Michael B. Rahaim, Thomas D. C. Little:
Design and Implementation of a Hybrid RF-VLC System with Bandwidth Aggregation. IWCMC 2018: 194-200 - [c41]Hazim Shakhatreh, Abdallah Khreishah:
Optimal Placement of a UAV to Maximize the Lifetime of Wireless Devices. IWCMC 2018: 1225-1230 - [c40]Monette H. Khadr, Hany Elgala, Moussa Ayyash, Thomas D. C. Little, Abdallah Khreishah, Michael B. Rahaim:
Security Aware Spatial Modulation (SA-SM). Sarnoff Symposium 2018: 1-6 - [c39]Guanxiong Liu, Hazim Shakhatreh, Abdallah Khreishah, Xiwang Guo, Nirwan Ansari:
Efficient Deployment of UAVs for Maximum Wireless Coverage Using Genetic Algorithm. Sarnoff Symposium 2018: 1-6 - [i17]Hazim Shakhatreh, Abdallah Khreishah:
Optimal Placement of a UAV to Maximize the Lifetime of Wireless Devices. CoRR abs/1804.02144 (2018) - [i16]Hazim Shakhatreh, Ahmad Sawalmeh, Ala I. Al-Fuqaha, Zuochao Dou, Eyad K. Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani:
Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges. CoRR abs/1805.00881 (2018) - [i15]Abdallah Khreishah, Sihua Shao, Ammar Gharaibeh, Moussa Ayyash, Hany Elgala, Nirwan Ansari:
A Hybrid RF-VLC System for Energy Efficient Wireless Access. CoRR abs/1806.05265 (2018) - [i14]Abbas Kiani, Nirwan Ansari, Abdallah Khreishah:
Hierarchical Capacity Provisioning for Fog Computing. CoRR abs/1807.01093 (2018) - 2017
- [j38]Adel Aldalbahi, Michael B. Rahaim, Abdallah Khreishah, Moussa Ayyash, Thomas D. C. Little:
Visible Light Communication Module: An Open Source Extension to the ns3 Network Simulator With Real System Validation. IEEE Access 5: 22144-22158 (2017) - [j37]Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, Ala I. Al-Fuqaha:
Smart Cities: A Survey on Data Management, Security, and Enabling Technologies. IEEE Commun. Surv. Tutorials 19(4): 2456-2501 (2017) - [j36]Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha, Mohsen Guizani:
Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection. IEEE Commun. Surv. Tutorials 19(4): 2797-2819 (2017) - [j35]Ammar Gharaibeh, Abdallah Khreishah, Mehdi Mohammadi, Ala I. Al-Fuqaha, Issa Khalil, Ammar Rayes:
Online Auction of Cloud Resources in Support of the Internet of Things. IEEE Internet Things J. 4(5): 1583-1596 (2017) - [j34]Zuochao Dou, Issa Khalil, Abdallah Khreishah:
CLAS: A Novel Communications Latency Based Authentication Scheme. Secur. Commun. Networks 2017: 4286903:1-4286903:20 (2017) - [j33]Mohammad Yousefvand, Tao Han, Nirwan Ansari, Abdallah Khreishah:
Distributed Energy-Spectrum Trading in Green Cognitive Radio Cellular Networks. IEEE Trans. Green Commun. Netw. 1(3): 253-263 (2017) - [j32]Pouya Ostovari, Jie Wu, Abdallah Khreishah:
Cooperative Internet Access Using Helper Nodes and Opportunistic Scheduling. IEEE Trans. Veh. Technol. 66(7): 6439-6448 (2017) - [c38]Hazim Shakhatreh, Abdallah Khreishah, Bo Ji:
Providing wireless coverage to high-rise buildings using UAVs. ICC 2017: 1-6 - [c37]Mohammed Jasim, Adel Aldalbahi, Abdallah Khreishah, Nasir Ghani:
Hooke Jeeves search method for initial beam access in 5G mmWave cellular networks. PIMRC 2017: 1-7 - [c36]Ammar Latif, Pradeep Kathail, Sachin Vishwarupe, Subha Dhesikan, Abdallah Khreishah:
iRP: intelligent rendezvous point for multicast control plane. Sarnoff Symposium 2017: 1-6 - [e1]Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan:
Wireless Algorithms, Systems, and Applications - 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10251, Springer 2017, ISBN 978-3-319-60032-1 [contents] - [i13]Xiansheng Guo, Sihua Shao, Nirwan Ansari, Abdallah Khreishah:
Indoor Localization Using Visible Light Via Fusion Of Multiple Classifiers. CoRR abs/1703.02184 (2017) - [i12]Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa Khalil:
On The Continuous Coverage Problem for a Swarm of UAVs. CoRR abs/1705.09766 (2017) - [i11]Hazim Shakhatreh, Abdallah Khreishah, Ayoub Alsarhan, Issa Khalil, Ahmad Sawalmeh, Noor Shamsiah Othman:
Efficient 3D Placement of a UAV Using Particle Swarm Optimization. CoRR abs/1705.09769 (2017) - [i10]Hazim Shakhatreh, Abdallah Khreishah, Bo Ji:
Providing Wireless Coverage to High-rise Buildings Using UAVs. CoRR abs/1705.09770 (2017) - [i9]Hazim Shakhatreh, Abdallah Khreishah, Issa Khalil:
The Indoor Mobile Coverage Problem Using UAVs. CoRR abs/1705.09771 (2017) - [i8]Hazim Shakhatreh, Abdallah Khreishah:
Maximizing Indoor Wireless Coverage Using UAVs Equipped with Directional Antennas. CoRR abs/1705.09772 (2017) - 2016
- [j31]Moussa Ayyash, Hany Elgala, Abdallah Khreishah, Volker Jungnickel, Thomas D. C. Little, Sihua Shao, Michael B. Rahaim, Dominic Schulz, Jonas Hilt, Ronald Freund:
Coexistence of WiFi and LiFi toward 5G: concepts, opportunities, and challenges. IEEE Commun. Mag. 54(2): 64-71 (2016) - [j30]Liang Zhang, Nirwan Ansari, Abdallah Khreishah:
Anycast Planning in Space Division Multiplexing Elastic Optical Networks With Multi-Core Fibers. IEEE Commun. Lett. 20(10): 1983-1986 (2016) - [j29]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Joint Link Scheduling and Brightness Control for Greening VLC-Based Indoor Access Networks. JOCN 8(3): 148-161 (2016) - [j28]Abdallah Khreishah, Jacob Chakareski, Ammar Gharaibeh:
Joint Caching, Routing, and Channel Assignment for Collaborative Small-Cell Cellular Networks. IEEE J. Sel. Areas Commun. 34(8): 2275-2284 (2016) - [j27]Mahmoud Al-Ayyoub, Yaser Jararweh, Ahmad Doulat, Haythem Ahmad Bany Salameh, Ahmad Al Abed Al Aziz, Mohammad A. Alsmirat, Abdallah Khreishah:
Virtualization-based Cognitive Radio Networks. J. Syst. Softw. 117: 15-29 (2016) - [j26]Abdallah Khreishah, Jacob Chakareski, Ammar Gharaibeh, Issa Khalil, Ali Diabat:
Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization. Simul. Model. Pract. Theory 64: 83-98 (2016) - [j25]Ammar Gharaibeh, Abdallah Khreishah, Bo Ji, Moussa Ayyash:
A Provably Efficient Online Collaborative Caching Algorithm for Multicell-Coordinated Systems. IEEE Trans. Mob. Comput. 15(8): 1863-1876 (2016) - [j24]Pouya Ostovari, Jie Wu, Abdallah Khreishah, Ness B. Shroff:
Scalable Video Streaming With Helper Nodes Using Random Linear Network Coding. IEEE/ACM Trans. Netw. 24(3): 1574-1587 (2016) - [j23]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Distributed Online En-Route Caching. IEEE Trans. Parallel Distributed Syst. 27(12): 3455-3468 (2016) - [j22]Sihua Shao, Abdallah Khreishah:
Delay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence. IEEE Trans. Wirel. Commun. 15(12): 8406-8421 (2016) - [c35]Issa Khalil, Zuochao Dou, Abdallah Khreishah:
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected. AsiaCCS 2016: 925-930 - [c34]Adel Aldalbahi, Michael B. Rahaim, Abdallah Khreishah, Moussa Ayyash, Ryan Ackerman, James Basuino, Walter Berreta, Thomas D. C. Little:
Extending ns3 to simulate visible light communication at network-level. ICT 2016: 1-6 - [c33]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil:
An O(1)-competitive online caching algorithm for content centric networking. INFOCOM 2016: 1-9 - [c32]Pouya Ostovari, Jie Wu, Abdallah Khreishah:
Efficient Online Collaborative Caching in Cellular Networks with Multiple Base Stations. MASS 2016: 136-144 - [c31]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Ali Tawalbeh, Abdallah Khreishah, Yaser Jararweh, Mahmoud Al-Ayyoub:
GA-Based Resource Augmentation Negotation for Energy-Optimised Mobile Ad-hoc Cloud. MobileCloud 2016: 110-116 - [c30]Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa M. Khalil:
On the continuous coverage problem for a swarm of UAVs. Sarnoff Symposium 2016: 130-135 - [i7]Sihua Shao, Abdallah Khreishah, Hany Elgala:
Pixelated VLC-backscattering for Self-charging Indoor IoT Devices. CoRR abs/1605.00626 (2016) - [i6]Abdallah Khreishah, Jacob Chakareski, Ammar Gharaibeh:
Joint Caching, Routing, and Channel Assignment for Collaborative Small-Cell Cellular Networks. CoRR abs/1605.09307 (2016) - 2015
- [j21]Pouya Ostovari, Abdallah Khreishah, Jie Wu, Wei-Shih Yang:
Trade-off between Redundancy and Feedback in Wireless Network Communication. Ad Hoc Sens. Wirel. Networks 24(1-2): 21-47 (2015) - [j20]Haythem Bany Salameh, Yaser Jararweh, Abdallah Khreishah, Taimour Aldalgamouni:
Cooperative weighted-fair control strategy for spectrum self-coexistence in multi-cell WRAN systems. Comput. Electr. Eng. 46: 65-77 (2015) - [j19]Ala I. Al-Fuqaha, Abdallah Khreishah, Mohsen Guizani, Ammar Rayes, Mehdi Mohammadi:
Toward better horizontal integration among IoT services. IEEE Commun. Mag. 53(9): 72-79 (2015) - [j18]Yaser Jararweh, Mahmoud Al-Ayyoub, Ahmad Doulat, Ahmad Al Abed Al Aziz, Haythem Bany Salameh, Abdallah Khreishah:
Software Defined Cognitive Radio Network Framework: Design and Evaluation. Int. J. Grid High Perform. Comput. 7(1): 15-31 (2015) - [j17]Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Michael B. Rahaim, Hany Elgala, Volker Jungnickel, Dominic Schulz, Thomas D. C. Little, Jonas Hilt, Ronald Freund:
Design and Analysis of a Visible-Light-Communication Enhanced WiFi System. JOCN 7(10): 960-973 (2015) - [j16]Mahmoud Al-Ayyoub, Mohammad Wardat, Yaser Jararweh, Abdallah Khreishah:
Optimizing expansion strategies for ultrascale cloud computing data centers. Simul. Model. Pract. Theory 58: 15-29 (2015) - [j15]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Universal Network Coding-Based Opportunistic Routing for Unicast. IEEE Trans. Parallel Distributed Syst. 26(6): 1765-1774 (2015) - [j14]Ismail Omar Hababeh, Issa M. Khalil, Abdallah Khreishah:
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System. IEEE Trans. Serv. Comput. 8(1): 47-64 (2015) - [j13]Pouya Ostovari, Abdallah Khreishah, Jie Wu:
Broadcasting with hard deadlines in wireless multihop networks using network coding. Wirel. Commun. Mob. Comput. 15(5): 983-999 (2015) - [c29]Abdallah Khreishah, Jacob Chakareski:
Collaborative caching for multicell-coordinated systems. INFOCOM Workshops 2015: 257-262 - [i5]Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Michael B. Rahaim, Hany Elgala, Volker Jungnickel, Dominic Schulz, Thomas D. C. Little:
Design of a visible-light-communication enhanced WiFi system. CoRR abs/1503.02367 (2015) - [i4]Ammar Gharaibeh, Abdallah Khreishah, Bo Ji, Moussa Ayyash:
A provably efficient online collaborative caching algorithm for multicell-coordinated systems. CoRR abs/1509.02911 (2015) - [i3]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Joint Link Scheduling and Brightness Control for Greening VLC-based Indoor Access Networks. CoRR abs/1510.00026 (2015) - [i2]Sihua Shao, Abdallah Khreishah, Moussa Ayyash:
Delay Analysis of Hybrid WiFi-LiFi System. CoRR abs/1510.00740 (2015) - 2014
- [j12]Issa M. Khalil, Abdallah Khreishah, Faheem Ahmed, Khaled Shuaib:
Dependable wireless sensor networks for reliable and secure humanitarian relief applications. Ad Hoc Networks 13: 94-106 (2014) - [j11]Issa Khalil, Abdallah Khreishah, Muhammad Azeem:
Consolidated Identity Management System for secure mobile cloud computing. Comput. Networks 65: 99-110 (2014) - [j10]Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem:
Cloud Computing Security: A Survey. Comput. 3(1): 1-35 (2014) - [j9]Pouya Ostovari, Jie Wu, Abdallah Khreishah:
Symbol-level reliable broadcasting of sensitive data in error-prone wireless networks. J. Parallel Distributed Comput. 74(7): 2673-2685 (2014) - [c28]Abdallah Khreishah, Issa Khalil, Ammar Gharaibeh, Haythem Bany Salameh, Rafe Alasem:
Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources. FiCloud 2014: 101-106 - [c27]Mohammad Wardat, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdallah Khreishah:
To Build or Not to Build? Addressing the Expansion Strategies of Cloud Providers. FiCloud 2014: 477-482 - [c26]Yaser Jararweh, Lo'ai Tawalbeh, Fadi Ababneh, Abdallah Khreishah, Fahd Dosari:
Scalable Cloudlet-based Mobile Computing Model. FNC/MobiSPC 2014: 434-441 - [c25]Yaser Jararweh, Mahmoud Al-Ayyoub, Ahmad Doulat, Ahmad Al Abed Al Aziz, Haythem Bany Salameh, Abdallah Khreishah:
SD-CRN: Software Defined Cognitive Radio Network Framework. IC2E 2014: 592-597 - [c24]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Asymptotically-Optimal Incentive-Based En-Route Caching Scheme. MASS 2014: 318-326 - [c23]Sihua Shao, Abdallah Khreishah, Michael B. Rahaim, Hany Elgala, Moussa Ayyash, Thomas D. C. Little, Jie Wu:
An Indoor Hybrid WiFi-VLC Internet Access System. MASS 2014: 569-574 - [c22]Issa M. Khalil, Zuochao Dou, Abdallah Khreishah:
TPM-Based Authentication Mechanism for Apache Hadoop. SecureComm (1) 2014: 105-122 - [c21]Haythem Bany Salameh, Yaser Jararweh, Taimour Aldalgamouni, Abdallah Khreishah:
Traffic-driven exclusive resource sharing algorithm for mitigating self-coexistence problem in WRAN systems. WCNC 2014: 1933-1937 - [c20]Ahmad Doulat, Ahmad Al Abed Al Aziz, Mahmoud Al-Ayyoub, Yaser Jararweh, Haythem Bany Salameh, Abdallah Khreishah:
Software defined framework for multi-cell Cognitive Radio Networks. WiMob 2014: 513-518 - [i1]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Asymptotically-Optimal Incentive-Based En-Route Caching Scheme. CoRR abs/1404.4639 (2014) - 2013
- [j8]Ismail Omar Hababeh, Issa Khalil, Abdallah Khreishah, Samir Bataineh:
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks. J. Comput. Sci. 9(12): 1626-1637 (2013) - [j7]Abdallah Khreishah, Issa Khalil, Jie Wu:
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 24(10): 2015-2024 (2013) - [c19]Issa M. Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad:
Security Concerns in Cloud Computing. ITNG 2013: 411-416 - [c18]Pouya Ostovari, Abdallah Khreishah, Jie Wu:
Multi-layer Video Streaming with Helper Nodes Using Network Coding. MASS 2013: 524-532 - [c17]Mo'taz Al-Hami, Abdallah Khreishah, Jie Wu:
Video Streaming over Wireless LAN with Network Coding. NCA 2013: 173-176 - [c16]Pouya Ostovari, Abdallah Khreishah, Jie Wu:
Cache content placement using triangular network coding. WCNC 2013: 1375-1380 - [c15]Pouya Ostovari, Jie Wu, Abdallah Khreishah:
Efficient symbol-level transmission in error-prone wireless networks. WOWMOM 2013: 1-9 - 2012
- [j6]Issa Khalil, Mamoun A. Awad, Abdallah Khreishah:
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks. Comput. Networks 56(14): 3300-3317 (2012) - [j5]Justin Y. Shi, Moussa Taifi, Abdallah Khreishah, Jie Wu:
Tuple switching network - When slower may be better. J. Parallel Distributed Comput. 72(11): 1521-1534 (2012) - [j4]Issa M. Khalil, Yasser Gadallah, Mohammad Hayajneh, Abdallah Khreishah:
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks. Sensors 12(7): 8782-8805 (2012) - [j3]Abdallah Khreishah, Issa M. Khalil, Pouya Ostovari, Jie Wu:
Flow-based XOR Network Coding for Lossy Wireless Networks. IEEE Trans. Wirel. Commun. 11(6): 2321-2329 (2012) - [c14]Pouya Ostovari, Abdallah Khreishah, Jie Wu:
Deadline-aware broadcasting in wireless networks with network coding. GLOBECOM 2012: 4435-4440 - [c13]Issa M. Khalil, Abdallah Khreishah:
On the analysis of identity delegation attacks. ICNC 2012: 990-994 - [c12]Pouya Ostovari, Jie Wu, Abdallah Khreishah:
Deadline-aware broadcasting in wireless networks with local network coding. ICNC 2012: 1123-1127 - [c11]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Distributed network coding-based opportunistic routing for multicast. MobiHoc 2012: 115-124 - [c10]Justin Y. Shi, Moussa Taifi, Aakash Pradeep, Abdallah Khreishah, Vivek Antony:
Program Scalability Analysis for HPC Cloud: Applying Amdahl's Law to NAS Benchmarks. SC Companion 2012: 1215-1225 - [c9]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Universal opportunistic routing scheme using network coding. SECON 2012: 353-361 - 2011
- [c8]Justin Y. Shi, Moussa Taifi, Abdallah Khreishah, Jie Wu:
Sustainable GPU Computing at Scale. CSE 2011: 263-272 - [c7]Abdallah Khreishah, Jie Wu, Pouya Ostovari, Issa M. Khalil:
Flow Based XOR Network Coding for Lossy Wireless Networks. GLOBECOM 2011: 1-5 - [c6]Justin Y. Shi, Moussa Taifi, Abdallah Khreishah:
Resource Planning for Parallel Processing in the Cloud. HPCC 2011: 828-833 - [c5]Moussa Taifi, Justin Y. Shi, Abdallah Khreishah:
SpotMPI: A Framework for Auction-Based HPC Computing Using Amazon Spot Instances. ICA3PP (2) 2011: 109-120 - [c4]Moussa Taifi, Abdallah Khreishah, Justin Y. Shi:
Natural HPC substrate: Exploitation of mixed multicore CPU and GPUs. HPCS 2011: 33-40 - [c3]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks. MASS 2011: 391-400 - 2010
- [j2]Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff:
Rate Control With Pairwise Intersession Network Coding. IEEE/ACM Trans. Netw. 18(3): 816-829 (2010)
2000 – 2009
- 2009
- [j1]Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff:
Cross-layer optimization for wireless multihop networks with pairwise intersession network coding. IEEE J. Sel. Areas Commun. 27(5): 606-621 (2009) - 2008
- [c2]Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff:
Optimization Based Rate Control for Communication Networks with Inter-Session Network Coding. INFOCOM 2008: 81-85 - 2007
- [c1]Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff:
Capacity regions for multiple unicast flows using inter-session network coding. WICON 2007: 5
Coauthor Index
aka: Issa Khalil
aka: Haythem Ahmad Bany Salameh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint