Amer AlGhadhban
Orcid: 0000-0003-4350-2759
According to our database1,
Amer AlGhadhban
authored at least 22 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Advanced Residual Optimal Mapping Approach for Precise Detection of Stator Faults in Induction Motors.
IEEE Access, 2024
2023
Syst., September, 2023
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis.
Comput. Secur., September, 2023
2022
Syst., 2022
IEEE Access, 2022
2021
Comput. Networks, 2021
All Your Fake Detector are Belong to Us: Evaluating Adversarial Robustness of Fake-News Detectors Under Black-Box Settings.
IEEE Access, 2021
2020
LightFDG: An Integrated Approach to Flow Detection and Grooming in Optical Wireless DCNs.
IEEE Trans. Netw. Serv. Manag., 2020
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
2019
IEEE Trans. Commun., 2019
Queuing Delay Model for Video Transmission Over Multi-Channel Underwater Wireless Optical Networks.
IEEE Access, 2019
2018
Design and provisioning of optical wireless data center networks: A traffic grooming approach.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
LightFD: A Lightweight Flow Detection Mechanism for Traffic Grooming in Optical Wireless DCNs.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2014
Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents.
Proceedings of the Network and Parallel Computing, 2014
2012
Prototyping and evaluating a tunnel-based solution to circumvent malicious IISP blocking.
Proceedings of the International Conference on Communications and Information Technology, 2012