Ibrahim Khalil
Orcid: 0000-0001-5512-114X
According to our database1,
Ibrahim Khalil
authored at least 234 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Appl. Math., September, 2024
Automated Disaster Monitoring From Social Media Posts Using AI-Based Location Intelligence and Sentiment Analysis.
IEEE Trans. Comput. Soc. Syst., August, 2024
An improved numerical approach for solving shape optimization problems on convex domains.
Numer. Algorithms, June, 2024
DSFL: A Decentralized SplitFed Learning Approach for Healthcare Consumers in the Metaverse.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Consumer Electron., February, 2024
IEEE Internet Things J., January, 2024
On a numerical approach for solving some geometrical shape optimization problems in fluid mechanics.
Commun. Nonlinear Sci. Numer. Simul., January, 2024
IEEE Trans. Sustain. Comput., 2024
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems.
IEEE Trans. Emerg. Top. Comput., 2024
Edge Unlearning is Not "on Edge"! An Adaptive Exact Unlearning System on Resource-Constrained Devices.
CoRR, 2024
CoRR, 2024
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance.
Comput. Networks, 2024
GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing.
Proceedings of the ACM on Web Conference 2024, 2024
2023
IEEE J. Sel. Areas Commun., November, 2023
A new numerical approach for solving shape optimization fourth-order spectral problems among convex domains.
Comput. Math. Appl., November, 2023
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023
Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain.
IEEE Trans. Ind. Informatics, July, 2023
Optim. Lett., July, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks.
IEEE Commun. Mag., June, 2023
A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems.
IEEE Internet Things J., April, 2023
Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence.
IEEE Internet Things J., March, 2023
Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications.
IEEE Internet Things J., February, 2023
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Ind. Informatics, 2023
Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat.
IEEE Internet Things J., 2023
Blockchain-Enabled and Multisignature-Powered Verifiable Model for Securing Federated Learning Systems.
IEEE Internet Things J., 2023
Concurr. Comput. Pract. Exp., 2023
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
ACM Trans. Internet Techn., 2022
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems.
IEEE Trans. Ind. Informatics, 2022
IEEE Netw., 2022
Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city.
J. Ind. Inf. Integr., 2022
Privacy-preserving location data stream clustering on mobile edge computing and cloud.
Inf. Syst., 2022
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
Deep Learning based Automatic Quantification of Urethral Plate Quality using the Plate Objective Scoring Tool (POST).
CoRR, 2022
Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures.
CoRR, 2022
Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge.
Comput. Commun., 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Serv. Comput., 2021
Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code.
IEEE J. Biomed. Health Informatics, 2021
Blockchain-Enabled SLA Compliance for Crowdsourced Edge-Based Network Function Virtualization.
IEEE Netw., 2021
Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems.
IEEE Netw., 2021
J. Parallel Distributed Comput., 2021
ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study.
Inf. Process. Manag., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Comput. Commun., 2021
Comput. Commun., 2021
IEEE Consumer Electron. Mag., 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the Product Lifecycle Management. Green and Blue Technologies to Support Smart and Sustainable Organizations, 2021
A Broker-Based Manufacturing Supply Chain Integration with Blockchain: Managing Odoo Workflows Using Hyperledger Fabric Smart Contracts.
Proceedings of the Product Lifecycle Management. Green and Blue Technologies to Support Smart and Sustainable Organizations, 2021
A Framework for Modelling Blockchain based Supply Chain Management System to ensure soundness of Smart Contract Workflow.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud.
IEEE Trans. Parallel Distributed Syst., 2020
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2020
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption.
J. Parallel Distributed Comput., 2020
J. Netw. Comput. Appl., 2020
Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption.
Eng. Appl. Artif. Intell., 2020
Comput. Secur., 2020
Comput. Methods Programs Biomed., 2020
Patient clustering using dynamic partitioning on correlated and uncertain biomedical data.
Comput. Methods Programs Biomed., 2020
Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain.
Proceedings of the Security and Privacy in Communication Networks, 2020
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020
Proceedings of the Australasian Computer Science Week, 2020
2019
Veh. Commun., 2019
Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Knowl. Based Syst., 2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019
Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
J. Parallel Distributed Comput., 2019
J. Netw. Comput. Appl., 2019
A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Int. J. Inf. Manag., 2019
IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography.
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
An efficient and scalable privacy preserving algorithm for big data and data streams.
Comput. Secur., 2019
Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare.
Comput. Networks, 2019
IEEE Commun. Mag., 2019
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
2018
IEEE Trans. Smart Grid, 2018
Pervasive Mob. Comput., 2018
Future Gener. Comput. Syst., 2018
Determining Anxiety in Obsessive Compulsive Disorder through Behavioural Clustering and Variations in Repetition Intensity.
Comput. Methods Programs Biomed., 2018
Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
IEEE Access, 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
2017
Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management.
IEEE Trans. Cloud Comput., 2017
BDCaM: Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare.
IEEE Trans. Cloud Comput., 2017
Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
IEEE Trans. Biomed. Eng., 2017
PEACE-Home: Probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring.
Pervasive Mob. Comput., 2017
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
J. Comput. Syst. Sci., 2017
Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
IET Wirel. Sens. Syst., 2017
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography.
Future Gener. Comput. Syst., 2017
ViSiBiD: A learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data.
Comput. Networks, 2017
A clinical decision-making mechanism for context-aware and patient-specific remote monitoring systems using the correlations of multiple vital signs.
Comput. Methods Programs Biomed., 2017
Ad Hoc Networks, 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
2016
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2016
<i>k</i>NNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering.
IEEE Trans. Knowl. Data Eng., 2016
A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission.
IEEE J. Biomed. Health Informatics, 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid.
Ad Hoc Networks, 2016
Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
Ad Hoc Networks, 2016
A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Computers, 2015
Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria.
IEEE Trans. Computers, 2015
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living.
Pattern Recognit., 2015
Pervasive Mob. Comput., 2015
Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
Pervasive Mob. Comput., 2015
Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
Inf. Syst., 2015
Multi-objective optimisation for selective packet discarding in wireless sensor network.
IET Wirel. Sens. Syst., 2015
Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications.
Comput. Networks, 2015
Comput. Networks, 2015
IEEE Cloud Comput., 2015
2014
IEEE Trans. Syst. Man Cybern. Syst., 2014
IEEE Trans. Emerg. Top. Comput., 2014
J. Netw. Comput. Appl., 2014
Garbled Routing (GR): A generic framework towards unification of anonymous communication systems.
J. Netw. Comput. Appl., 2014
J. Netw. Comput. Appl., 2014
An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content.
J. Netw. Comput. Appl., 2014
Accurate positioning using long range active RFID technology to assist visually impaired people.
J. Netw. Comput. Appl., 2014
J. Netw. Comput. Appl., 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion.
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems.
Comput. Secur., 2014
Load-sensitive dynamic workflow re-orchestration and optimisation for faster patient healthcare.
Comput. Methods Programs Biomed., 2014
IEEE Cloud Comput., 2014
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems.
Proceedings of the 13th IEEE International Conference on Trust, 2014
CluClas: Hybrid clustering-classification approach for accurate and efficient network classification.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
2013
Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.
IEEE Trans. Biomed. Eng., 2013
IEEE J. Sel. Areas Commun., 2013
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling.
J. Parallel Distributed Comput., 2013
Fractal self-similarity measurements based clustering technique for SOAP Web messages.
J. Parallel Distributed Comput., 2013
Toward an efficient and scalable feature selection approach for internet traffic classification.
Comput. Networks, 2013
Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.
Comput. Methods Programs Biomed., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013
Proceedings of the Computing in Cardiology, 2013
2012
J. Netw. Comput. Appl., 2012
Biometric sample extraction using Mahalanobis distance in Cardioid based graph using electrocardiogram signals.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012
Safe trajectory estimation at a pedestrian crossing to assist visually impaired people.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012
2011
Diagnosis of Cardiovascular Abnormalities From Compressed ECG: A Data Mining-Based Approach.
IEEE Trans. Inf. Technol. Biomed., 2011
Cardioids-based faster authentication and diagnosis of remote cardiovascular patients.
Secur. Commun. Networks, 2011
A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Secur. Commun. Networks, 2011
Secur. Commun. Networks, 2011
Faster person identification using compressed ECG in time critical wireless telecardiology applications.
J. Netw. Comput. Appl., 2011
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Netw. Comput. Appl., 2011
Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
J. Medical Syst., 2011
A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
Expert Syst. Appl., 2011
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011
Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System.
Proceedings of the 2011 Frontiers of Information Technology, 2011
Person identification in irregular cardiac conditions using electrocardiogram signals.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Handbook of Information and Communication Security, 2010
Secur. Commun. Networks, 2010
Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams.
Proceedings of the 2010 International Conference on High Performance Computing, 2010
2009
IEEE J. Sel. Areas Commun., 2009
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking.
J. Medical Syst., 2009
J. Medical Syst., 2009
2008
Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism.
Secur. Commun. Networks, 2008
Int. J. Biom., 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the Distributed Computing and Internet Technology, 2007
2006
Proceedings of the LCN 2006, 2006
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
A Gossip-based Membership Management Algorithm for Large-Scale Peer-to-Peer Media Streaming.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
2004
Proceedings of the Distributed Computing and Internet Technology, 2004
2002
Proceedings of the Management Solutions for the New Communications World, 2002
2001
Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains.
Proceedings of the Management of Multimedia on the Internet, 2001
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
2000
Implementation of a Bandwidth Broker for Dynamic End-to-End Resource Reservation in Outsourced Virtual Private Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000
1999
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999
1998
Proceedings of the Workshop on Wide Area Networks and High Performance Computing, 1998