Publications

Publications done by the SPINE Research Group

2025

  • On numerical resolution of shape optimization bi-Laplacian eigenvalue problems.
    Abdelkrim Chakib, Ibrahim Khalil, Azeddine Sadik
    Math. Comput. Simul. 149-164 (2025).
    Source: https://doi.org/10.1016/j.matcom.2024.11.007

2024

  • GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing.
    Ziqi Wang, Xiaoyu Xia, Minhui Xue, Ibrahim Khalil, Minghui Liwang, Xun Yi
    WWW 2735-2746 (2024).
    Source: https://doi.org/10.1145/3589334.3645329
  • Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System.
    Xu Yang, Xuechao Yang, Junwei Luo, Xun Yi, Ibrahim Khalil, Shangqi Lai, Wei Wu, Albert Y. Zomaya
    IEEE Trans. Sustain. Comput. 88-99 (2024).
    Source: https://doi.org/10.1109/TSUSC.2023.3308081
  • Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems.
    Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi
    IEEE Trans. Emerg. Top. Comput. 269-280 (2024).
    Source: https://doi.org/10.1109/TETC.2023.3268186
  • Automated Disaster Monitoring From Social Media Posts Using AI-Based Location Intelligence and Sentiment Analysis.
    Fahim K. Sufi, Ibrahim Khalil
    IEEE Trans. Comput. Soc. Syst. 4614-4624 (2024).
    Source: https://doi.org/10.1109/TCSS.2022.3157142
  • DSFL: A Decentralized SplitFed Learning Approach for Healthcare Consumers in the Metaverse.
    Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Trans. Consumer Electron. 2107-2115 (2024).
    Source: https://doi.org/10.1109/TCE.2024.3360994
  • A Fusion of Supervised Contrastive Learning and Variational Quantum Classifiers.
    Asitha Kottahachchi Kankanamge Don, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Trans. Consumer Electron. 770-779 (2024).
    Source: https://doi.org/10.1109/TCE.2024.3351649
  • An improved numerical approach for solving shape optimization problems on convex domains.
    Abdelkrim Chakib, Ibrahim Khalil, Azeddine Sadik
    Numer. Algorithms 621-663 (2024).
    Source: https://doi.org/10.1007/s11075-023-01660-4
  • QARMA-FL: Quality-Aware Robust Model Aggregation for Mobile Crowdsourcing.
    Shehan Edirimannage, Charitha Elvitigala, Ibrahim Khalil, Primal Wijesekera, Xun Yi
    IEEE Internet Things J. 1800-1815 (2024).
    Source: https://doi.org/10.1109/JIOT.2023.3325443
  • On a numerical approach for solving some geometrical shape optimization problems in fluid mechanics.
    Abdelkrim Chakib, Ibrahim Khalil, Hamid Ouaissa, Azeddine Sadik
    Commun. Nonlinear Sci. Numer. Simul. 107651 (2024).
    Source: https://doi.org/10.1016/j.cnsns.2023.107651
  • An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance.
    Farah Wahida, M. A. P. Chamikara, Ibrahim Khalil, Mohammed Atiquzzaman
    Comput. Networks 110798 (2024).
    Source: https://doi.org/10.1016/j.comnet.2024.110798
  • On some geometrical eigenvalue inverse problems involving the p-Laplacian operator.
    Abdelkrim Chakib, Ibrahim Khalil
    Comput. Appl. Math. 340 (2024).
    Source: https://doi.org/10.1007/s40314-024-02855-8

2023

  • Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
    Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal
    ASSS@AsiaCCS 3:1-3:11 (2023).
    Source: https://doi.org/10.1145/3591365.3592947
  • Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
    Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang
    IEEE Trans. Sustain. Comput. 32-42 (2023).
    Source: https://doi.org/10.1109/TSUSC.2022.3211298
  • AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges.
    Firas Al-Doghman, Nour Moustafa, Ibrahim Khalil, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya
    IEEE Trans. Serv. Comput. 1485-1504 (2023).
    Source: https://doi.org/10.1109/TSC.2022.3155447
  • Smart Policy Control for Securing Federated Learning Management System.
    Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Trans. Netw. Serv. Manag. 1600-1611 (2023).
    Source: https://doi.org/10.1109/TNSM.2023.3276594
  • A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
    Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Xinyi Huang, Feihong Xu
    IEEE Trans. Intell. Transp. Syst. 10456-10466 (2023).
    Source: https://doi.org/10.1109/TITS.2023.3275077
  • Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain.
    Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi
    IEEE Trans. Ind. Informatics 7936-7945 (2023).
    Source: https://doi.org/10.1109/TII.2022.3214998
  • Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things.
    Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
    IEEE Trans. Ind. Informatics 1703-1714 (2023).
    Source: https://doi.org/10.1109/TII.2022.3170348
  • Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things.
    Neda Bugshan, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Shahriar Badsha
    IEEE Trans. Ind. Informatics 1535-1547 (2023).
    Source: https://doi.org/10.1109/TII.2022.3209200
  • An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure.
    Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Trans. Ind. Informatics 1238-1247 (2023).
    Source: https://doi.org/10.1109/TII.2022.3203707
  • On an effective approach in shape optimization problem for Stokes equation.
    Abdelkrim Chakib, Ibrahim Khalil, Hamid Ouaissa, Azeddine Sadik
    Optim. Lett. 1487-1494 (2023).
    Source: https://doi.org/10.1007/s11590-023-01970-5
  • Digital Twin Enabled Asynchronous SplitFed Learning in E-Healthcare Systems.
    Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE J. Sel. Areas Commun. 3650-3661 (2023).
    Source: https://doi.org/10.1109/JSAC.2023.3310103
  • Blockchain-Enabled and Multisignature-Powered Verifiable Model for Securing Federated Learning Systems.
    Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Internet Things J. 21410-21420 (2023).
    Source: https://doi.org/10.1109/JIOT.2023.3289832
  • Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat.
    Ziaur Rahman, Xun Yi, Ibrahim Khalil
    IEEE Internet Things J. 6769-6778 (2023).
    Source: https://doi.org/10.1109/JIOT.2022.3147186
  • A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems.
    Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, Charalambos Konstantinou
    IEEE Internet Things J. 5719-5732 (2023).
    Source: https://doi.org/10.1109/JIOT.2022.3172936
  • Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence.
    Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman
    IEEE Internet Things J. 3763-3773 (2023).
    Source: https://doi.org/10.1109/JIOT.2022.3151982
  • Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications.
    Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mohammad Saidur Rahman
    IEEE Internet Things J. 2821-2831 (2023).
    Source: https://doi.org/10.1109/JIOT.2021.3098980
  • ECG compression technique using fast fractals in the Internet of medical things.
    Ayman Ibaida, Sharif Abuadbba, Dhiah Al-Shammary, Ibrahim Khalil
    Concurr. Comput. Pract. Exp. N/A (2023).
    Source: https://doi.org/10.1002/cpe.7812
  • A new numerical approach for solving shape optimization fourth-order spectral problems among convex domains.
    Abdelkrim Chakib, Ibrahim Khalil
    Comput. Math. Appl. 171-189 (2023).
    Source: https://doi.org/10.1016/j.camwa.2023.09.001
  • Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks.
    Neda Bugshan, Ibrahim Khalil, Aditya Pribadi Kalapaaking, Mohammed Atiquzzaman
    IEEE Commun. Mag. 86-92 (2023).
    Source: https://doi.org/10.1109/MCOM.001.2200535

2022

  • Blockchain-Based Access Control for Secure Smart Industry Management Systems.
    Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras
    NSS 615-630 (2022).
    Source: https://doi.org/10.1007/978-3-031-23020-2_35
  • Local Differential Privacy for Federated Learning.
    Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bert�k, Ibrahim Khalil
    ESORICS (1) 195-216 (2022).
    Source: https://doi.org/10.1007/978-3-031-17140-6_10
  • Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
    Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen
    IEEE Trans. Serv. Comput. 2728-2741 (2022).
    Source: https://doi.org/10.1109/TSC.2021.3059856
  • A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
    Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino
    ACM Trans. Internet Techn. 57:1-57:25 (2022).
    Source: https://doi.org/10.1145/3453171
  • A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems.
    Mohammad Saidur Rahman, Ibrahim Khalil, Nour Moustafa, Aditya Pribadi Kalapaaking, Abdelaziz Bouras
    IEEE Trans. Ind. Informatics 5007-5017 (2022).
    Source: https://doi.org/10.1109/TII.2021.3105527
  • SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things.
    Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
    IEEE Netw. 182-189 (2022).
    Source: https://doi.org/10.1109/MNET.007.2100717
  • Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city.
    Mohammad Saidur Rahman, M. A. P. Chamikara, Ibrahim Khalil, Abdelaziz Bouras
    J. Ind. Inf. Integr. 100408 (2022).
    Source: https://doi.org/10.1016/j.jii.2022.100408
  • Privacy-preserving location data stream clustering on mobile edge computing and cloud.
    Veronika Stephanie, M. A. P. Chamikara, Ibrahim Khalil, Mohammed Atiquzzaman
    Inf. Syst. 101728 (2022).
    Source: https://doi.org/10.1016/j.is.2021.101728
  • Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs.
    Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang
    IEEE Internet Things J. 12563-12572 (2022).
    Source: https://doi.org/10.1109/JIOT.2021.3138989
  • Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
    Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang, Xingfu Yan
    IEEE Internet Things J. 12209-12218 (2022).
    Source: https://doi.org/10.1109/JIOT.2021.3134693
  • Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
    Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal
    IEEE Internet Things J. 3321-3332 (2022).
    Source: https://doi.org/10.1109/JIOT.2021.3098007
  • Radial Basis Function Network with Differential Privacy.
    Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mahathir Almashor, Alsharif Abuadbba
    Future Gener. Comput. Syst. 473-486 (2022).
    Source: https://doi.org/10.1016/j.future.2021.09.013
  • Social Media Identity Deception Detection: A Survey.
    Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil
    ACM Comput. Surv. 69:1-69:35 (2022).
    Source: https://doi.org/10.1145/3446372
  • Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge.
    Mohammad Saidur Rahman, Abdulatif Alabdulatif, Ibrahim Khalil
    Comput. Commun. 373-381 (2022).
    Source: https://doi.org/10.1016/j.comcom.2022.06.013
  • Forward-Secure Edge Authentication for Graphs.
    Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang
    Comput. J. 1653-1665 (2022).
    Source: https://doi.org/10.1093/comjnl/bxab004

2021

  • Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
    Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen
    SERVICES 11 (2021).
    Source: https://doi.org/10.1109/SERVICES51467.2021.00022
  • Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security.
    Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi
    QSHINE 177-193 (2021).
    Source: https://doi.org/10.1007/978-3-030-91424-0_11
  • Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability.
    Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
    QSHINE 57-74 (2021).
    Source: https://doi.org/10.1007/978-3-030-91424-0_4
  • A Broker-Based Manufacturing Supply Chain Integration with Blockchain: Managing Odoo Workflows Using Hyperledger Fabric Smart Contracts.
    Abdelhak Belhi, Houssem Gasmi, Assam Hammi, Abdelaziz Bouras, Bela�d Aouni, Ibrahim Khalil
    PLM (2) 371-385 (2021).
    Source: https://doi.org/10.1007/978-3-030-94399-8_27
  • Blockchain-Based Manufacturing Supply Chain Management Using HyperLedger Fabric.
    Houssem Gasmi, Abdelhak Belhi, Assam Hammi, Abdelaziz Bouras, Bela�d Aouni, Ibrahim Khalil
    PLM (1) 305-318 (2021).
    Source: https://doi.org/10.1007/978-3-030-94335-6_22
  • A Framework for Modelling Blockchain based Supply Chain Management System to ensure soundness of Smart Contract Workflow.
    Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras
    HICSS 1-10 (2021).
    Source: https://hdl.handle.net/10125/71295
  • An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
    Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, Ibrahim Khalil
    IEEE Trans. Sustain. Comput. 66-79 (2021).
    Source: https://doi.org/10.1109/TSUSC.2019.2906657
  • Privacy Preserving Location-Aware Personalized Web Service Recommendations.
    Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam
    IEEE Trans. Serv. Comput. 791-804 (2021).
    Source: https://doi.org/10.1109/TSC.2018.2839587
  • Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code.
    Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi
    IEEE J. Biomed. Health Informatics 35-46 (2021).
    Source: https://doi.org/10.1109/JBHI.2020.2988449
  • Blockchain-Enabled SLA Compliance for Crowdsourced Edge-Based Network Function Virtualization.
    Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Netw. 58-65 (2021).
    Source: https://doi.org/10.1109/MNET.011.2100086
  • Blockchain-Enabled Intelligent Vehicular Edge Computing.
    Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Hung M. La, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Netw. 125-131 (2021).
    Source: https://doi.org/10.1109/MNET.011.2000554
  • Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems.
    Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman
    IEEE Netw. 116-123 (2021).
    Source: https://doi.org/10.1109/MNET.011.2000219
  • A scalable blockchain based trust management in VANET routing protocol.
    Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Hung Manh La, Ibrahim Khalil, Mohammed Atiquzzaman
    J. Parallel Distributed Comput. 144-156 (2021).
    Source: https://doi.org/10.1016/j.jpdc.2021.02.024
  • Towards secure and practical consensus for blockchain based VANET.
    Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Albert Y. Zomaya
    Inf. Sci. 170-187 (2021).
    Source: https://doi.org/10.1016/j.ins.2020.07.060
  • ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study.
    Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil
    Inf. Process. Manag. 102508 (2021).
    Source: https://doi.org/10.1016/j.ipm.2021.102508
  • Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
    Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang
    IEEE Internet Things J. 11678-11689 (2021).
    Source: https://doi.org/10.1109/JIOT.2021.3059570
  • PPaaS: Privacy Preservation as a Service.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe
    Comput. Commun. 192-205 (2021).
    Source: https://doi.org/10.1016/j.comcom.2021.04.006
  • EdgeSOM: Distributed Hierarchical Edge-driven IoT Data Analytics Framework.
    Kassem Bagher, Ibrahim Khalil, Abdulatif Alabdulatif, Mohammed Atiquzzaman
    Comput. Commun. 64-74 (2021).
    Source: https://doi.org/10.1016/j.comcom.2021.02.021
  • Privacy preserving distributed machine learning with federated learning.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe
    Comput. Commun. 112-125 (2021).
    Source: https://doi.org/10.1016/j.comcom.2021.02.014
  • Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System.
    Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
    IEEE Commun. Mag. 128-134 (2021).
    Source: https://doi.org/10.1109/MCOM.001.2000679
  • Reputation-Based Miner Node Selection in Blockchain-Based Vehicular Edge Computing.
    Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil
    IEEE Consumer Electron. Mag. 14-22 (2021).
    Source: https://doi.org/10.1109/MCE.2020.3048312

2020

  • Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain.
    Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras
    SecureComm (2) 391-402 (2020).
    Source: https://doi.org/10.1007/978-3-030-63095-9_25
  • Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
    Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang
    ProvSec 145-165 (2020).
    Source: https://doi.org/10.1007/978-3-030-62576-4_8
  • BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City.
    Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil
    PerCom Workshops 1-6 (2020).
    Source: https://doi.org/10.1109/PerComWorkshops48775.2020.9156237
  • BACC: Blockchain-Based Access Control For Cloud Data.
    Nasrin Sohrabi, Xun Yi, Zahir Tari, Ibrahim Khalil
    ACSW 10:1-10:10 (2020).
    Source: https://doi.org/10.1145/3373017.3373027
  • Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud.
    Abdulatif Alabdulatif, Ibrahim Khalil, Albert Y. Zomaya, Zahir Tari, Xun Yi
    IEEE Trans. Parallel Distributed Syst. 2668-2681 (2020).
    Source: https://doi.org/10.1109/TPDS.2020.2999407
  • A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman
    IEEE Trans. Ind. Informatics 6092-6102 (2020).
    Source: https://doi.org/10.1109/TII.2020.2974555
  • Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption.
    Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi
    J. Parallel Distributed Comput. 192-204 (2020).
    Source: https://doi.org/10.1016/j.jpdc.2019.10.008
  • Lightweight privacy preservation for secondary users in cognitive radio networks.
    Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil
    J. Netw. Comput. Appl. 102652 (2020).
    Source: https://doi.org/10.1016/j.jnca.2020.102652
  • Efficient privacy preservation of big data for accurate data mining.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Ahmet �amtepe, Ibrahim Khalil
    Inf. Sci. 420-443 (2020).
    Source: https://doi.org/10.1016/j.ins.2019.05.053
  • Local Differential Privacy for Deep Learning.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman
    IEEE Internet Things J. 5827-5842 (2020).
    Source: https://doi.org/10.1109/JIOT.2019.2952146
  • Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption.
    Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi
    Eng. Appl. Artif. Intell. 103737 (2020).
    Source: https://doi.org/10.1016/j.engappai.2020.103737
  • Privacy Preserving Face Recognition Utilizing Differential Privacy.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe
    Comput. Secur. 101951 (2020).
    Source: https://doi.org/10.1016/j.cose.2020.101951
  • Patient clustering using dynamic partitioning on correlated and uncertain biomedical data.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Heshan Kumarage
    Comput. Methods Programs Biomed. 105483 (2020).
    Source: https://doi.org/10.1016/j.cmpb.2020.105483
  • An intelligent healthcare system with data priority based on multi vital biosignals.
    Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman
    Comput. Methods Programs Biomed. 105126 (2020).
    Source: https://doi.org/10.1016/j.cmpb.2019.105126

2019

  • ADS4all: Democratizing Authenticated Data Structures.
    Nasser Alzahrani, Ibrahim Khalil, Xun Yi
    ICSOC Workshops 280-286 (2019).
    Source: https://doi.org/10.1007/978-3-030-45989-5_24
  • A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud.
    Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Tao Gu
    HICSS 1-10 (2019).
    Source: https://hdl.handle.net/10125/59862
  • A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
    Mohammad Saidur Rahman, Ibrahim Khalil, Mahawaga Arachchige Pathum Chamikara, Abdelaziz Bouras, Xun Yi
    BSCI 97-105 (2019).
    Source: https://doi.org/10.1145/3327960.3332392
  • A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
    Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui
    Veh. Commun. 16-27 (2019).
    Source: https://doi.org/10.1016/j.vehcom.2018.11.001
  • Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
    Mohammad Saidur Rahman, Ibrahim Khalil, Abdulatif Alabdulatif, Xun Yi
    Knowl. Based Syst. 104-115 (2019).
    Source: https://doi.org/10.1016/j.knosys.2019.05.022
  • Efficient threshold password-authenticated secret sharing protocols for cloud computing.
    Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya
    J. Parallel Distributed Comput. 57-70 (2019).
    Source: https://doi.org/10.1016/j.jpdc.2019.01.013
  • Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
    Abdulatif Alabdulatif, Ibrahim Khalil, Heshan Kumarage, Albert Y. Zomaya, Xun Yi
    J. Parallel Distributed Comput. 209-223 (2019).
    Source: https://doi.org/10.1016/j.jpdc.2017.12.011
  • Privacy-preserving aggregation for cooperative spectrum sensing.
    Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil
    J. Netw. Comput. Appl. 54-64 (2019).
    Source: https://doi.org/10.1016/j.jnca.2019.05.011
  • A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
    Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi
    Int. J. Inf. Manag. 276-288 (2019).
    Source: https://doi.org/10.1016/j.ijinfomgt.2018.08.011
  • A new privacy-preserving authentication protocol for anonymous web browsing.
    Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng
    Concurr. Comput. Pract. Exp. N/A (2019).
    Source: https://doi.org/10.1002/cpe.4706
  • An efficient and scalable privacy preserving algorithm for big data and data streams.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Ahmet �amtepe, Ibrahim Khalil
    Comput. Secur. N/A (2019).
    Source: https://doi.org/10.1016/j.cose.2019.101570
  • Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare.
    Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman
    Comput. Networks 127-143 (2019).
    Source: https://doi.org/10.1016/j.comnet.2018.11.002
  • Real-time Secure Health Surveillance for Smarter Health Communities.
    Abdulatif Alabdulatif, Ibrahim Khalil, Abdur Rahim Mohammad Forkan, Mohammed Atiquzzaman
    IEEE Commun. Mag. 122-129 (2019).
    Source: https://doi.org/10.1109/MCOM.2017.1700547
  • Secure Edge of Things for Smart Healthcare Surveillance Framework.
    Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi, Mohsen Guizani
    IEEE Access 31010-31021 (2019).
    Source: https://doi.org/10.1109/ACCESS.2019.2899323

2018

  • An Improved Lightweight RFID Authentication Protocol for Internet of Things.
    Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal
    WISE (1) 111-126 (2018).
    Source: https://doi.org/10.1007/978-3-030-02922-7_8
  • GazeRevealer: Inferring Password Using Smartphone Front Camera.
    Yao Wang, Wan-Dong Cai, Tao Gu, Wei Shao, Ibrahim Khalil, Xianghua Xu
    MobiQuitous 254-263 (2018).
    Source: https://doi.org/10.1145/3286978.3287026
  • Gaussian Approximation-Based Lossless Compression of Smart Meter Readings.
    Alsharif Abuadbba, Ibrahim Khalil, Xinghuo Yu
    IEEE Trans. Smart Grid 5047-5056 (2018).
    Source: https://doi.org/10.1109/TSG.2017.2679111
  • Efficient data perturbation for privacy preserving and accurate data stream mining.
    Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil
    Pervasive Mob. Comput. 1-19 (2018).
    Source: https://doi.org/10.1016/j.pmcj.2018.05.003
  • Fast and peer-to-peer vital signal learning system for cloud-based healthcare.
    Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman
    Future Gener. Comput. Syst. 220-233 (2018).
    Source: https://doi.org/10.1016/j.future.2018.05.042
  • Determining Anxiety in Obsessive Compulsive Disorder through Behavioural Clustering and Variations in Repetition Intensity.
    Conor Cameron, Ibrahim Khalil, David Castle
    Comput. Methods Programs Biomed. 65-74 (2018).
    Source: https://doi.org/10.1016/j.cmpb.2018.03.019
  • Privacy Preserving User Based Web Service Recommendations.
    Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam
    IEEE Access 56647-56657 (2018).
    Source: https://doi.org/10.1109/ACCESS.2018.2871447
  • Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
    Shahriar Badsha, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
    IEEE Access 42119-42130 (2018).
    Source: https://doi.org/10.1109/ACCESS.2018.2856299

2017

  • Privacy Preserving Location Recommendations.
    Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino
    WISE (2) 502-516 (2017).
    Source: https://doi.org/10.1007/978-3-319-68786-5_40
  • Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
    Abdulatif Alabdulatif, Ibrahim Khalil, Mark C. Reynolds, Heshan Kumarage, Xun Yi
    PACIS 289 (2017).
    Source: https://aisel.aisnet.org/pacis2017/289
  • Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
    Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Hai Dong
    PACIS 230 (2017).
    Source: http://aisel.aisnet.org/pacis2017/230
  • Private Recommendations Generation for Vertically Partitioned Datasets.
    Shahriar Badsha, Xun Yi, Ibrahim Khalil, Andrei Kelarev
    PACIS 163 (2017).
    Source: http://aisel.aisnet.org/pacis2017/163
  • Privacy Preserving User-Based Recommender System.
    Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino
    ICDCS 1074-1083 (2017).
    Source: https://doi.org/10.1109/ICDCS.2017.248
  • BDCaM: Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Ayman Ibaida, Zahir Tari
    IEEE Trans. Cloud Comput. 628-641 (2017).
    Source: https://doi.org/10.1109/TCC.2015.2440269
  • Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management.
    Uthpala Subodhani Premarathne, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya
    IEEE Trans. Cloud Comput. 290-302 (2017).
    Source: https://doi.org/10.1109/TCC.2015.2404816
  • Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
    Alsharif Abuadbba, Ibrahim Khalil
    IEEE Trans. Biomed. Eng. 2186-2195 (2017).
    Source: https://doi.org/10.1109/TBME.2016.2631885
  • PEACE-Home: Probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil
    Pervasive Mob. Comput. 296-311 (2017).
    Source: https://doi.org/10.1016/j.pmcj.2016.12.009
  • Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
    Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Xun Yi
    J. Comput. Syst. Sci. 28-45 (2017).
    Source: https://doi.org/10.1016/j.jcss.2017.03.001
  • Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
    Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi
    IET Wirel. Sens. Syst. 182-190 (2017).
    Source: https://doi.org/10.1049/iet-wss.2017.0061
  • Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography.
    Vu Mai, Ibrahim Khalil
    Future Gener. Comput. Syst. 327-338 (2017).
    Source: https://doi.org/10.1016/j.future.2016.06.003
  • ViSiBiD: A learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Mohammed Atiquzzaman
    Comput. Networks 244-257 (2017).
    Source: https://doi.org/10.1016/j.comnet.2016.12.019
  • A clinical decision-making mechanism for context-aware and patient-specific remote monitoring systems using the correlations of multiple vital signs.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil
    Comput. Methods Programs Biomed. 1-16 (2017).
    Source: https://doi.org/10.1016/j.cmpb.2016.10.018
  • Reliable delay-sensitive spectrum handoff management for re-entrant secondary users.
    Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman
    Ad Hoc Networks 85-94 (2017).
    Source: https://doi.org/10.1016/j.adhoc.2017.04.008

2016

  • A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil
    PerCom 1-9 (2016).
    Source: https://doi.org/10.1109/PERCOM.2016.7456519
  • Securing Body Sensor Network with ECG.
    Xuechao Yang, Xun Yi, Ibrahim Khalil, Fengling Han, Zahir Tari
    MoMM 298-306 (2016).
    Source: http://dl.acm.org/citation.cfm?id=3007121
  • kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering.
    Abdulmohsen Almalawi, Adil Fahad, Zahir Tari, Muhammad Aamir Cheema, Ibrahim Khalil
    ICDE 1572-1573 (2016).
    Source: https://doi.org/10.1109/ICDE.2016.7498431
  • Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
    Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman, Ibrahim Habib, Jiankun Hu
    Wirel. Commun. Mob. Comput. 59-78 (2016).
    Source: https://doi.org/10.1002/wcm.2488
  • kNNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering.
    Abdul Mohsen Almalawi, Adil Fahad, Zahir Tari, Muhammad Aamir Cheema, Ibrahim Khalil
    IEEE Trans. Knowl. Data Eng. 68-81 (2016).
    Source: https://doi.org/10.1109/TKDE.2015.2460735
  • A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission.
    Naimah Yaakob, Ibrahim Khalil
    IEEE J. Biomed. Health Informatics 669-681 (2016).
    Source: https://doi.org/10.1109/JBHI.2015.2406884
  • ID2S Password-Authenticated Key Exchange Protocols.
    Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya
    IEEE Trans. Computers 3687-3701 (2016).
    Source: https://doi.org/10.1109/TC.2016.2553031
  • A Practical Privacy-Preserving Recommender System.
    Shahriar Badsha, Xun Yi, Ibrahim Khalil
    Data Sci. Eng. 161-177 (2016).
    Source: https://doi.org/10.1007/s41019-016-0020-2
  • Hybrid Cryptographic Access Control for Cloud-Based EHR Systems.
    Uthpala Subodhani Premarathne, Alsharif Abuadbba, Abdulatif Alabdulatif, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Rajkumar Buyya
    IEEE Cloud Comput. 58-64 (2016).
    Source: https://doi.org/10.1109/MCC.2016.76
  • Secure Data Analytics for Cloud-Integrated Internet of Things Applications.
    Heshan Kumarage, Ibrahim Khalil, Abdulatif Alabdulatif, Zahir Tari, Xun Yi
    IEEE Cloud Comput. 46-56 (2016).
    Source: https://doi.org/10.1109/MCC.2016.30
  • Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
    Alsharif Abuadbba, Ibrahim Khalil, Ayman Ibaida, Mohammed Atiquzzaman
    Ad Hoc Networks 30-46 (2016).
    Source: https://doi.org/10.1016/j.adhoc.2015.11.002
  • Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid.
    Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman
    Ad Hoc Networks 15-29 (2016).
    Source: https://doi.org/10.1016/j.adhoc.2015.12.004

2015

  • Cooperative Web Caching Using Dynamic Interest-Tagged Filtered Bloom Filters.
    Holly Alexander, Ibrahim Khalil, Conor Cameron, Zahir Tari, Albert Y. Zomaya
    IEEE Trans. Parallel Distributed Syst. 2956-2969 (2015).
    Source: https://doi.org/10.1109/TPDS.2014.2363458
  • Enhancing Availability in Content Delivery Networks for Mobile Platforms.
    Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Sartaj Sahni
    IEEE Trans. Parallel Distributed Syst. 2247-2257 (2015).
    Source: https://doi.org/10.1109/TPDS.2013.2297927
  • Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria.
    Heshan Kumarage, Ibrahim Khalil, Zahir Tari
    IEEE Trans. Computers 2573-2585 (2015).
    Source: https://doi.org/10.1109/TC.2014.2366755
  • By-Passing Infected Areas in Wireless Sensor Networks Using BPR.
    Naimah Yaakob, Ibrahim Khalil, Heshan Kumarage, Mohammed Atiquzzaman, Zahir Tari
    IEEE Trans. Computers 1594-1606 (2015).
    Source: https://doi.org/10.1109/TC.2014.2345400
  • A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Zahir Tari, Sebti Foufou, Abdelaziz Bouras
    Pattern Recognit. 628-641 (2015).
    Source: https://doi.org/10.1016/j.patcog.2014.07.007
  • Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
    Alsharif Abuadbba, Ibrahim Khalil, Mohammed Atiquzzaman
    Pervasive Mob. Comput. 58-70 (2015).
    Source: https://doi.org/10.1016/j.pmcj.2015.02.003
  • Secure and reliable surveillance over cognitive radio sensor networks in smart grid.
    Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman
    Pervasive Mob. Comput. 3-15 (2015).
    Source: https://doi.org/10.1016/j.pmcj.2015.05.001
  • Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
    Alsharif Abuadbba, Ibrahim Khalil
    Inf. Syst. 224-236 (2015).
    Source: https://doi.org/10.1016/j.is.2014.09.004
  • Multi-objective optimisation for selective packet discarding in wireless sensor network.
    Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman
    IET Wirel. Sens. Syst. 124-136 (2015).
    Source: https://doi.org/10.1049/iet-wss.2014.0020
  • Multi-Binomial mixes: A proposal for secure and efficient anonymous communication.
    Shaahin Madani, Ibrahim Khalil
    Comput. Networks 41-53 (2015).
    Source: https://doi.org/10.1016/j.comnet.2015.10.007
  • Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications.
    Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman
    Comput. Networks 161-177 (2015).
    Source: https://doi.org/10.1016/j.comnet.2015.06.002
  • Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
    Zahir Tari, Xun Yi, Uthpala Subodhani Premarathne, Peter Bert�k, Ibrahim Khalil
    IEEE Cloud Comput. 30-38 (2015).
    Source: https://doi.org/10.1109/MCC.2015.45

2014

  • Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems.
    Uthpala Subodhani Premarathne, Ibrahim Khalil
    TrustCom 221-228 (2014).
    Source: https://doi.org/10.1109/TrustCom.2014.33
  • CluClas: Hybrid clustering-classification approach for accurate and efficient network classification.
    Adil Fahad, Kurayman Alharthi, Zahir Tari, Abdulmohsen Almalawi, Ibrahim Khalil
    LCN 168-176 (2014).
    Source: https://doi.org/10.1109/LCN.2014.6925769
  • ECG Biometric with Abnormal Cardiac Conditions in Remote Monitoring System.
    Khairul Azami Sidek, Ibrahim Khalil, Herbert F. Jelinek
    IEEE Trans. Syst. Man Cybern. Syst. 1498-1509 (2014).
    Source: https://doi.org/10.1109/TSMC.2014.2336842
  • A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis.
    Adil Fahad, Najlaa Alshatri, Zahir Tari, Abdullah Alamri, Ibrahim Khalil, Albert Y. Zomaya, Sebti Foufou, Abdelaziz Bouras
    IEEE Trans. Emerg. Top. Comput. 267-279 (2014).
    Source: https://doi.org/10.1109/TETC.2014.2330519
  • Garbled Routing (GR): A generic framework towards unification of anonymous communication systems.
    Shaahin Madani, Ibrahim Khalil
    J. Netw. Comput. Appl. 183-195 (2014).
    Source: https://doi.org/10.1016/j.jnca.2014.05.005
  • Data mining in mobile ECG based biometric identification.
    Khairul Azami Sidek, Vu Mai, Ibrahim Khalil
    J. Netw. Comput. Appl. 83-91 (2014).
    Source: https://doi.org/10.1016/j.jnca.2014.04.008
  • Accurate positioning using long range active RFID technology to assist visually impaired people.
    Saleh Alghamdi, Ron G. van Schyndel, Ibrahim Khalil
    J. Netw. Comput. Appl. 135-147 (2014).
    Source: https://doi.org/10.1016/j.jnca.2013.10.015
  • A distributed aggregation and fast fractal clustering approach for SOAP traffic.
    Dhiah Al-Shammary, Ibrahim Khalil, Zahir Tari
    J. Netw. Comput. Appl. 1-14 (2014).
    Source: https://doi.org/10.1016/j.jnca.2013.10.001
  • PileCast: Multiple bit rate live video streaming over BitTorrent.
    Aukrit Chadagorn, Ibrahim Khalil, Conor Cameron, Zahir Tari
    J. Netw. Comput. Appl. 167-178 (2014).
    Source: https://doi.org/10.1016/j.jnca.2013.06.001
  • An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content.
    Conor Cameron, Ibrahim Khalil, Zahir Tari
    J. Netw. Comput. Appl. 293-314 (2014).
    Source: https://doi.org/10.1016/j.jnca.2013.03.005
  • Data summarization for network traffic monitoring.
    Demetris Hoplaros, Zahir Tari, Ibrahim Khalil
    J. Netw. Comput. Appl. 194-205 (2014).
    Source: https://doi.org/10.1016/j.jnca.2013.02.021
  • PPFSCADA: Privacy preserving framework for SCADA data publishing.
    Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood
    Future Gener. Comput. Syst. 496-511 (2014).
    Source: https://doi.org/10.1016/j.future.2014.03.002
  • An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion.
    Adil Fahad, Zahir Tari, Ibrahim Khalil, Abdulmohsen Almalawi, Albert Y. Zomaya
    Future Gener. Comput. Syst. 156-169 (2014).
    Source: https://doi.org/10.1016/j.future.2013.09.015
  • CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living.
    Abdur Forkan, Ibrahim Khalil, Zahir Tari
    Future Gener. Comput. Syst. 114-127 (2014).
    Source: https://doi.org/10.1016/j.future.2013.07.009
  • Cloud enabled fractal based ECG compression in wireless body sensor networks.
    Ayman Ibaida, Dhiah Al-Shammary, Ibrahim Khalil
    Future Gener. Comput. Syst. 91-101 (2014).
    Source: https://doi.org/10.1016/j.future.2013.12.025
  • An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems.
    Abdulmohsen Almalawi, Xinghuo Yu, Zahir Tari, Adil Fahad, Ibrahim Khalil
    Comput. Secur. 94-110 (2014).
    Source: https://doi.org/10.1016/j.cose.2014.07.005
  • Load-sensitive dynamic workflow re-orchestration and optimisation for faster patient healthcare.
    Christopher L. Meli, Ibrahim Khalil, Zahir Tari
    Comput. Methods Programs Biomed. 1-14 (2014).
    Source: https://doi.org/10.1016/j.cmpb.2013.06.019
  • Securing Big Data Applications in the Cloud [Guest editors' introduction].
    Bharat K. Bhargava, Ibrahim Khalil, Ravi S. Sandhu
    IEEE Cloud Comput. 24-26 (2014).
    Source: https://doi.org/10.1109/MCC.2014.65

2013

  • A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems.
    Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil
    TrustCom/ISPA/IUCC 292-301 (2013).
    Source: https://doi.org/10.1109/TrustCom.2013.40
  • Garbled Routing (GR): Towards Unification of Anonymous Networks.
    Shaahin Madani, Ibrahim Khalil
    TrustCom/ISPA/IUCC 50-57 (2013).
    Source: https://doi.org/10.1109/TrustCom.2013.10
  • Turbo-coded HARQ scheme in multi-hop cooperative wireless networks.
    Ibrahim Khalil, Adnan Ahmed Khan
    WMNC 1-4 (2013).
    Source: https://doi.org/10.1109/WMNC.2013.6549042
  • SCADAVT-A framework for SCADA security testbed based on virtualization technology.
    Abdulmohsen Almalawi, Zahir Tari, Ibrahim Khalil, Adil Fahad
    LCN 639-646 (2013).
    Source: https://doi.org/10.1109/LCN.2013.6761301
  • Protection of electronic health records (EHRs) in cloud.
    Abdulatif Alabdulatif, Ibrahim Khalil, Vu Mai
    EMBC 4191-4194 (2013).
    Source: https://doi.org/10.1109/EMBC.2013.6610469
  • Steganography-based access control to medical data hidden in electrocardiogram.
    Vu Mai, Ibrahim Khalil, Ayman Ibaida
    EMBC 1302-1305 (2013).
    Source: https://doi.org/10.1109/EMBC.2013.6609747
  • Preference based load balancing as an outpatient appointment scheduling aid.
    Uthpala Subodhani Premarathne, Fengling Han, Ibrahim Khalil, Zahir Tari
    EMBC 1298-1301 (2013).
    Source: https://doi.org/10.1109/EMBC.2013.6609746
  • Context-aware Cardiac Monitoring for Early Detection of Heart Diseases.
    Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Zahir Tari
    CinC 277-280 (2013).
    Source: http://www.cinc.org/archives/2013/pdf/0277.pdf
  • Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.
    Ayman Ibaida, Ibrahim Khalil
    IEEE Trans. Biomed. Eng. 3322-3330 (2013).
    Source: https://doi.org/10.1109/TBME.2013.2264539
  • Automatic and Autonomous Load Management in Peer-to-Peer Virtual Environments.
    Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya
    IEEE J. Sel. Areas Commun. 310-324 (2013).
    Source: https://doi.org/10.1109/JSAC.2013.SUP.0513028
  • Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling.
    Heshan Kumarage, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya
    J. Parallel Distributed Comput. 790-806 (2013).
    Source: https://doi.org/10.1016/j.jpdc.2013.02.004
  • Fractal self-similarity measurements based clustering technique for SOAP Web messages.
    Dhiah Al-Shammary, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya
    J. Parallel Distributed Comput. 664-676 (2013).
    Source: https://doi.org/10.1016/j.jpdc.2013.01.005
  • Toward an efficient and scalable feature selection approach for internet traffic classification.
    Adil Fahad, Zahir Tari, Ibrahim Khalil, Ibrahim Habib, Hussein M. Alnuweiri
    Comput. Networks 2040-2057 (2013).
    Source: https://doi.org/10.1016/j.comnet.2013.04.005
  • Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.
    Khairul Azami Sidek, Ibrahim Khalil
    Comput. Methods Programs Biomed. 13-25 (2013).
    Source: https://doi.org/10.1016/j.cmpb.2012.08.015

2012

2011

  • Clustering SOAP Web Services on Internet Computing Using Fast Fractals.
    Dhiah Al-Shammary, Ibrahim Khalil, Loay Edwar George
    NCA 366-371 (2011).
    Source: https://doi.org/10.1109/NCA.2011.65
  • Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams.
    Mahathir Almashor, Ibrahim Khalil
    NCA 235-240 (2011).
    Source: https://doi.org/10.1109/NCA.2011.40
  • On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
    Naimah Yaakob, Ibrahim Khalil, Jiankun Hu
    MobiHealth 16-23 (2011).
    Source: https://doi.org/10.1007/978-3-642-29734-2_3
  • Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System.
    Ibrahim Khalil, Adnan Ahmed Khan, Zohaib-Ur-Rehman
    FIT 253-257 (2011).
    Source: https://doi.org/10.1109/FIT.2011.54
  • Real-time wearable telecardiology from representative signals.
    Christopher L. Meli, George Fernandez, Ibrahim Khalil
    EMBC 4967-4971 (2011).
    Source: https://doi.org/10.1109/IEMBS.2011.6091231
  • Person identification in irregular cardiac conditions using electrocardiogram signals.
    Khairul Azami Sidek, Ibrahim Khalil
    EMBC 3772-3775 (2011).
    Source: https://doi.org/10.1109/IEMBS.2011.6090644
  • ECG biometric using multilayer perceptron and radial basis function neural networks.
    Vu Mai, Ibrahim Khalil, Christopher L. Meli
    EMBC 2745-2748 (2011).
    Source: https://doi.org/10.1109/IEMBS.2011.6090752
  • Dynamic Fractal Clustering Technique for SOAP Web Messages.
    Dhiah Al-Shammary, Ibrahim Khalil
    IEEE SCC 96-103 (2011).
    Source: https://doi.org/10.1109/SCC.2011.15
  • Diagnosis of Cardiovascular Abnormalities From Compressed ECG: A Data Mining-Based Approach.
    Fahim K. Sufi, Ibrahim Khalil
    IEEE Trans. Inf. Technol. Biomed. 33-39 (2011).
    Source: https://doi.org/10.1109/TITB.2010.2094197
  • Cardioids-based faster authentication and diagnosis of remote cardiovascular patients.
    Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib
    Secur. Commun. Networks 1351-1368 (2011).
    Source: https://doi.org/10.1002/sec.262
  • An embedded DSP hardware encryption module for secure e-commerce transactions.
    Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil
    Secur. Commun. Networks 902-909 (2011).
    Source: https://doi.org/10.1002/sec.221
  • A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
    Fahim K. Sufi, Fengling Han, Ibrahim Khalil, Jiankun Hu
    Secur. Commun. Networks 515-524 (2011).
    Source: https://doi.org/10.1002/sec.226
  • Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
    Jiankun Hu, Ibrahim Khalil, Song Han, Abdun Naser Mahmood
    J. Netw. Comput. Appl. 1150-1159 (2011).
    Source: https://doi.org/10.1016/j.jnca.2010.11.013
  • Faster person identification using compressed ECG in time critical wireless telecardiology applications.
    Fahim K. Sufi, Ibrahim Khalil
    J. Netw. Comput. Appl. 282-293 (2011).
    Source: https://doi.org/10.1016/j.jnca.2010.07.004
  • Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
    Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood
    J. Medical Syst. 1349-1358 (2011).
    Source: https://doi.org/10.1007/s10916-009-9412-4
  • A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
    Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood
    Expert Syst. Appl. 4705-4713 (2011).
    Source: https://doi.org/10.1016/j.eswa.2010.08.149

2010

  • Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams.
    Mahathir Almashor, Ibrahim Khalil, Geoff Leach
    NCA 253-256 (2010).
    Source: https://doi.org/10.1109/NCA.2010.46
  • Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
    Naimah Yaakob, Ibrahim Khalil, Jiankun Hu
    NCA 210-213 (2010).
    Source: https://doi.org/10.1109/NCA.2010.37
  • SOAP Web Services Compression Using Variable and Fixed Length Coding.
    Dhiah Al-Shammary, Ibrahim Khalil
    NCA 84-91 (2010).
    Source: https://doi.org/10.1109/NCA.2010.18
  • Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments.
    Mahathir Almashor, Ibrahim Khalil
    ICPADS 839-844 (2010).
    Source: https://doi.org/10.1109/ICPADS.2010.97
  • Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams.
    Mahathir Almashor, Ibrahim Khalil
    HiPC 1-10 (2010).
    Source: https://doi.org/10.1109/HIPC.2010.5713197
  • Polynomial distance measurement for ECG based biometric authentication.
    Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib
    Secur. Commun. Networks 303-319 (2010).
    Source: https://doi.org/10.1002/sec.76

2009

  • Novel methods of faster cardiovascular diagnosis in wireless telecardiology.
    Fahim K. Sufi, Qiang Fang, Ibrahim Khalil, Seedahmed S. Mahmoud
    IEEE J. Sel. Areas Commun. 537-552 (2009).
    Source: https://doi.org/10.1109/JSAC.2009.090515
  • Cooperative Remote Video Consultation on Demand for e-Patients.
    Ibrahim Khalil, Fahim K. Sufi
    J. Medical Syst. 475-483 (2009).
    Source: https://doi.org/10.1007/s10916-008-9208-y
  • A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking.
    Fahim K. Sufi, Ibrahim Khalil
    J. Medical Syst. 121-132 (2009).
    Source: https://doi.org/10.1007/s10916-008-9172-6

2008

  • QoS-aware Application Layer Multicast.
    Bin Rong, Ibrahim Khalil, Zahir Tari
    ISCC 1029-1033 (2008).
    Source: https://doi.org/10.1109/ISCC.2008.4625594
  • Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism.
    Fahim K. Sufi, Ibrahim Khalil
    Secur. Commun. Networks 389-405 (2008).
    Source: https://doi.org/10.1002/sec.44
  • A novel wavelet packet-based anti-spoofing technique to secure ECG data.
    Fahim K. Sufi, Seedahmed S. Mahmoud, Ibrahim Khalil
    Int. J. Biom. 191-208 (2008).
    Source: https://doi.org/10.1504/IJBM.2008.020144

2007

2006

2005

  • A Gossip-based Membership Management Algorithm for Large-Scale Peer-to-Peer Media Streaming.
    Bin Rong, Ibrahim Khalil, Zahir Tari
    LCN 486-487 (2005).
    Source: https://doi.org/10.1109/LCN.2005.7

2004

2002

2001

2000

1999

1998

  • Differentiated Internet Services.
    Florian Baumgartner, Torsten Braun, Hans Joachim Einsiedler, Ibrahim Khalil
    Wide Area Networks and High Performance Computing 37-59 (1998).
    Source: https://doi.org/10.1007/BFb0110078