Ali Chehab
Orcid: 0000-0002-1939-2740
According to our database1,
Ali Chehab
authored at least 266 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Wirel. Networks, October, 2024
Wirel. Networks, October, 2024
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models.
Mach. Learn. Knowl. Extr., March, 2024
CoRR, 2024
Large Multimodal Agents for Accurate Phishing Detection with Enhanced Token Optimization and Cost Reduction.
CoRR, 2024
To Ensemble or Not: Assessing Majority Voting Strategies for Phishing Detection with Large Language Models.
CoRR, 2024
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications.
CoRR, 2024
Proceedings of the International Wireless Communications and Mobile Computing, 2024
2023
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms.
J. Inf. Secur. Appl., August, 2023
Concurr. Comput. Pract. Exp., 2023
Ad Hoc Networks, 2023
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023
2022
Veh. Commun., 2022
An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security.
Telecommun. Syst., 2022
Group LARS-Based Iterative Reweighted Least Squares Methodology for Efficient Statistical Modeling of Memory Designs.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
J. Ambient Intell. Humaniz. Comput., 2022
J. Inf. Secur. Appl., 2022
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms.
J. Inf. Secur. Appl., 2022
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices.
IEEE Internet Things J., 2022
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations.
Internet Things, 2022
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations.
Int. J. Inf. Sec., 2022
A machine learning based framework for IoT device identification and abnormal traffic detection.
Trans. Emerg. Telecommun. Technol., 2022
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning.
Comput. Networks, 2022
Mutated traffic detection and recovery: an adversarial generative deep learning approach.
Ann. des Télécommunications, 2022
Ad Hoc Networks, 2022
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022
Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022
2021
Microprocess. Microsystems, November, 2021
Wirel. Networks, 2021
Telecommun. Syst., 2021
Data representation for CNN based internet traffic classification: a comparative study.
Multim. Tools Appl., 2021
J. Sens. Actuator Networks, 2021
J. Inf. Secur. Appl., 2021
Security of Power Line Communication systems: Issues, limitations and existing solutions.
Comput. Sci. Rev., 2021
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations.
CoRR, 2021
Comput. Networks, 2021
Ann. des Télécommunications, 2021
Proceedings of the Eighth International Conference on Software Defined Systems, 2021
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
Proceedings of the International Symposium on Networks, Computers and Communications, 2021
2020
Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN.
IEEE Netw., 2020
Multim. Tools Appl., 2020
ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents.
Multim. Tools Appl., 2020
Microprocess. Microsystems, 2020
Internet Things, 2020
Internet Things, 2020
Int. J. Inf. Sec., 2020
Securing internet of medical things systems: Limitations, issues and recommendations.
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Efficient and secure multi-homed systems based on binary random linear network coding.
Comput. Electr. Eng., 2020
Ann. des Télécommunications, 2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Proceedings of the Mobile, Secure, and Programmable Networking, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2020
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020
2019
Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach.
IEEE Wirel. Commun., 2019
Signal Process. Image Commun., 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach.
Mob. Networks Appl., 2019
IEEE Internet Things J., 2019
3D Beamforming With Massive Cylindrical Arrays for Physical Layer Secure Data Transmission.
IEEE Commun. Lett., 2019
Design and realization of efficient & secure multi-homed systems based on random linear network coding.
Comput. Networks, 2019
IEEE Access, 2019
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the Machine Learning for Networking, 2019
Joint Security and Energy Efficiency in IoT Networks Through Clustering and Bit Flipping.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 22nd Conference on Innovation in Clouds, 2019
Proceedings of the Fourth International Conference on Advances in Computational Tools for Engineering Applications, 2019
2018
IEEE Trans. Smart Grid, 2018
Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis.
IEEE Trans. Commun., 2018
IEEE Trans. Commun., 2018
Secur. Commun. Networks, 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Microelectron. Reliab., 2018
IEEE Commun. Lett., 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Joint channel allocation and power control for D2D communications using stochastic geometry.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 9th International Conference on the Network of the Future, 2018
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Double error cellular automata-based error correction with skip-mode compact syndrome coding for resilient PUF design.
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Proceedings of the 2018 International Conference on IC Design & Technology, 2018
Proceedings of the 2018 International Conference on IC Design & Technology, 2018
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
2017
Microprocess. Microsystems, 2017
IEEE Commun. Lett., 2017
Comput. Commun., 2017
A Distance-Based Power Control Scheme for D2D Communications Using Stochastic Geometry.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 8th International Conference on the Network of the Future, 2017
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017
Regularized logistic regression for fast importance sampling based SRAM yield analysis.
Proceedings of the 18th International Symposium on Quality Electronic Design, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the 2017 IEEE International Conference on IC Design and Technology, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
Proceedings of the 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2017
2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Efficient near optimal joint modulation classification and detection for MU-MIMO systems.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 3rd International Conference on Advances in Computational Tools for Engineering Applications, 2016
2015
Partial mobile application offloading to the cloud for energy-efficiency with security measures.
Sustain. Comput. Informatics Syst., 2015
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks.
Sensors, 2015
Mob. Inf. Syst., 2015
Clust. Comput., 2015
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Algorithmic Optimizations in the HMAX Model Targeted for Efficient Object Recognition.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2015
Efficient Implementation of a Recognition System using the Cortex Ventral Stream Model.
Proceedings of the VISAPP 2015, 2015
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015
An architecture for the Internet of Things with decentralized data and centralized control.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
2014
Int. J. Space Based Situated Comput., 2014
Int. J. Auton. Adapt. Commun. Syst., 2014
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud.
Future Gener. Comput. Syst., 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
PUF and ID-based key distribution security framework for advanced metering infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the Fifteenth International Symposium on Quality Electronic Design, 2014
Robust bias temperature instability refresh design and methodology for memory cell recovery.
Proceedings of the 2014 IEEE International Conference on IC Design & Technology, 2014
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
ALPS: The Accountable Cloud Protocol Stack.
Proceedings of the CLOSER 2014, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014
2013
J. Signal Process. Syst., 2013
Microprocess. Microsystems, 2013
Comput. Commun., 2013
Clust. Comput., 2013
Proceedings of the 2013 Wireless Telecommunications Symposium, 2013
User experience-based mechanism for preserving energy in graphics-intensive applications.
Proceedings of the IEEE 11th International New Circuits and Systems Conference, 2013
Proceedings of the 8th International Design and Test Symposium, 2013
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013
Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work?
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Proceedings of the ACM Symposium on Applied Computing, 2012
CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012
Proceedings of the 19th International Conference on Telecommunications, 2012
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System.
Proceedings of the 19th International Conference on Telecommunications, 2012
Proceedings of the International Conference on Energy Aware Computing, 2012
Proceedings of the International Conference on Energy Aware Computing, 2012
2011
Comput. Secur., 2011
Proceedings of the IEEE Workshop on Signal Processing Systems, 2011
Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
The effectiveness of delay and IDDT tests in detecting resistive open defects for nanometer CMOS adder circuits.
Proceedings of the 6th IEEE International Design and Test Workshop, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 18th IEEE International Conference on Electronics, Circuits and Systems, 2011
Proceedings of the International Conference on Energy Aware Computing, 2011
Proceedings of the International Conference on Energy Aware Computing, 2011
Proceedings of the International Conference on Energy Aware Computing, 2011
Proceedings of the International Conference on Energy Aware Computing, 2011
Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
Proceedings of the CLOSER 2011, 2011
2010
STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments.
Int. J. Dependable Trust. Inf. Syst., 2010
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks.
Proceedings of the Q2SWinet'10, 2010
Transient current and delay analysis for resistive-open defects in future 16 nm CMOS circuits.
Proceedings of the 17th IEEE International Conference on Electronics, 2010
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
Proceedings of the Global Communications Conference, 2010
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
The design and implementation of an ad hoc network of mobile devices using the LIME II tuple-space framework.
IEEE Wirel. Commun., 2009
Wireless Sensor for Continuous Real-Time Oil Spill Thickness and Location Measurement.
IEEE Trans. Instrum. Meas., 2009
Secur. Commun. Networks, 2009
Int. J. Netw. Secur., 2009
Proceedings of the NTMS 2009, 2009
PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2008
Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes.
Pervasive Mob. Comput., 2008
Int. J. Netw. Secur., 2008
2007
Lighter Weight Mobile Agent System.
Int. J. Comput. Their Appl., 2007
An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
2006
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices.
Int. J. Netw. Secur., 2006
Int. J. Bus. Data Commun. Netw., 2006
J. Electron. Test., 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
An enterprise policy-based security protocol for protecting relational database network objects.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Int. J. Web Grid Serv., 2005
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
2004
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004
2002
Proceedings of the 1st IEEE International Workshop on Electronic Design, 2002