On numerical resolution of shape optimization bi-Laplacian eigenvalue problems.
Abdelkrim Chakib, Ibrahim Khalil, Azeddine Sadik Math. Comput. Simul. 149-164 (2025).
Source: https://doi.org/10.1016/j.matcom.2024.11.007
2024
GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing.
Ziqi Wang, Xiaoyu Xia, Minhui Xue, Ibrahim Khalil, Minghui Liwang, Xun Yi WWW 2735-2746 (2024).
Source: https://doi.org/10.1145/3589334.3645329
Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System.
Xu Yang, Xuechao Yang, Junwei Luo, Xun Yi, Ibrahim Khalil, Shangqi Lai, Wei Wu, Albert Y. Zomaya IEEE Trans. Sustain. Comput. 88-99 (2024).
Source: https://doi.org/10.1109/TSUSC.2023.3308081
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi IEEE Trans. Emerg. Top. Comput. 269-280 (2024).
Source: https://doi.org/10.1109/TETC.2023.3268186
Automated Disaster Monitoring From Social Media Posts Using AI-Based Location Intelligence and Sentiment Analysis.
Fahim K. Sufi, Ibrahim Khalil IEEE Trans. Comput. Soc. Syst. 4614-4624 (2024).
Source: https://doi.org/10.1109/TCSS.2022.3157142
DSFL: A Decentralized SplitFed Learning Approach for Healthcare Consumers in the Metaverse.
Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Trans. Consumer Electron. 2107-2115 (2024).
Source: https://doi.org/10.1109/TCE.2024.3360994
A Fusion of Supervised Contrastive Learning and Variational Quantum Classifiers.
Asitha Kottahachchi Kankanamge Don, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Trans. Consumer Electron. 770-779 (2024).
Source: https://doi.org/10.1109/TCE.2024.3351649
An improved numerical approach for solving shape optimization problems on convex domains.
Abdelkrim Chakib, Ibrahim Khalil, Azeddine Sadik Numer. Algorithms 621-663 (2024).
Source: https://doi.org/10.1007/s11075-023-01660-4
QARMA-FL: Quality-Aware Robust Model Aggregation for Mobile Crowdsourcing.
Shehan Edirimannage, Charitha Elvitigala, Ibrahim Khalil, Primal Wijesekera, Xun Yi IEEE Internet Things J. 1800-1815 (2024).
Source: https://doi.org/10.1109/JIOT.2023.3325443
On a numerical approach for solving some geometrical shape optimization problems in fluid mechanics.
Abdelkrim Chakib, Ibrahim Khalil, Hamid Ouaissa, Azeddine Sadik Commun. Nonlinear Sci. Numer. Simul. 107651 (2024).
Source: https://doi.org/10.1016/j.cnsns.2023.107651
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance.
Farah Wahida, M. A. P. Chamikara, Ibrahim Khalil, Mohammed Atiquzzaman Comput. Networks 110798 (2024).
Source: https://doi.org/10.1016/j.comnet.2024.110798
On some geometrical eigenvalue inverse problems involving the p-Laplacian operator.
Abdelkrim Chakib, Ibrahim Khalil Comput. Appl. Math. 340 (2024).
Source: https://doi.org/10.1007/s40314-024-02855-8
2023
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal ASSS@AsiaCCS 3:1-3:11 (2023).
Source: https://doi.org/10.1145/3591365.3592947
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang IEEE Trans. Sustain. Comput. 32-42 (2023).
Source: https://doi.org/10.1109/TSUSC.2022.3211298
AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges.
Firas Al-Doghman, Nour Moustafa, Ibrahim Khalil, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya IEEE Trans. Serv. Comput. 1485-1504 (2023).
Source: https://doi.org/10.1109/TSC.2022.3155447
Smart Policy Control for Securing Federated Learning Management System.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Trans. Netw. Serv. Manag. 1600-1611 (2023).
Source: https://doi.org/10.1109/TNSM.2023.3276594
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Xinyi Huang, Feihong Xu IEEE Trans. Intell. Transp. Syst. 10456-10466 (2023).
Source: https://doi.org/10.1109/TITS.2023.3275077
Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain.
Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi IEEE Trans. Ind. Informatics 7936-7945 (2023).
Source: https://doi.org/10.1109/TII.2022.3214998
Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor IEEE Trans. Ind. Informatics 1703-1714 (2023).
Source: https://doi.org/10.1109/TII.2022.3170348
Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things.
Neda Bugshan, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Shahriar Badsha IEEE Trans. Ind. Informatics 1535-1547 (2023).
Source: https://doi.org/10.1109/TII.2022.3209200
An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure.
Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Trans. Ind. Informatics 1238-1247 (2023).
Source: https://doi.org/10.1109/TII.2022.3203707
On an effective approach in shape optimization problem for Stokes equation.
Abdelkrim Chakib, Ibrahim Khalil, Hamid Ouaissa, Azeddine Sadik Optim. Lett. 1487-1494 (2023).
Source: https://doi.org/10.1007/s11590-023-01970-5
Digital Twin Enabled Asynchronous SplitFed Learning in E-Healthcare Systems.
Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman IEEE J. Sel. Areas Commun. 3650-3661 (2023).
Source: https://doi.org/10.1109/JSAC.2023.3310103
Blockchain-Enabled and Multisignature-Powered Verifiable Model for Securing Federated Learning Systems.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Internet Things J. 21410-21420 (2023).
Source: https://doi.org/10.1109/JIOT.2023.3289832
Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat.
Ziaur Rahman, Xun Yi, Ibrahim Khalil IEEE Internet Things J. 6769-6778 (2023).
Source: https://doi.org/10.1109/JIOT.2022.3147186
A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems.
Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, Charalambos Konstantinou IEEE Internet Things J. 5719-5732 (2023).
Source: https://doi.org/10.1109/JIOT.2022.3172936
Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence.
Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman IEEE Internet Things J. 3763-3773 (2023).
Source: https://doi.org/10.1109/JIOT.2022.3151982
Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications.
Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mohammad Saidur Rahman IEEE Internet Things J. 2821-2831 (2023).
Source: https://doi.org/10.1109/JIOT.2021.3098980
ECG compression technique using fast fractals in the Internet of medical things.
Ayman Ibaida, Sharif Abuadbba, Dhiah Al-Shammary, Ibrahim Khalil Concurr. Comput. Pract. Exp. N/A (2023).
Source: https://doi.org/10.1002/cpe.7812
A new numerical approach for solving shape optimization fourth-order spectral problems among convex domains.
Abdelkrim Chakib, Ibrahim Khalil Comput. Math. Appl. 171-189 (2023).
Source: https://doi.org/10.1016/j.camwa.2023.09.001
Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks.
Neda Bugshan, Ibrahim Khalil, Aditya Pribadi Kalapaaking, Mohammed Atiquzzaman IEEE Commun. Mag. 86-92 (2023).
Source: https://doi.org/10.1109/MCOM.001.2200535
2022
Blockchain-Based Access Control for Secure Smart Industry Management Systems.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras NSS 615-630 (2022).
Source: https://doi.org/10.1007/978-3-031-23020-2_35
Local Differential Privacy for Federated Learning.
Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bert�k, Ibrahim Khalil ESORICS (1) 195-216 (2022).
Source: https://doi.org/10.1007/978-3-031-17140-6_10
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen IEEE Trans. Serv. Comput. 2728-2741 (2022).
Source: https://doi.org/10.1109/TSC.2021.3059856
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino ACM Trans. Internet Techn. 57:1-57:25 (2022).
Source: https://doi.org/10.1145/3453171
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems.
Mohammad Saidur Rahman, Ibrahim Khalil, Nour Moustafa, Aditya Pribadi Kalapaaking, Abdelaziz Bouras IEEE Trans. Ind. Informatics 5007-5017 (2022).
Source: https://doi.org/10.1109/TII.2021.3105527
SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things.
Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor IEEE Netw. 182-189 (2022).
Source: https://doi.org/10.1109/MNET.007.2100717
Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city.
Mohammad Saidur Rahman, M. A. P. Chamikara, Ibrahim Khalil, Abdelaziz Bouras J. Ind. Inf. Integr. 100408 (2022).
Source: https://doi.org/10.1016/j.jii.2022.100408
Privacy-preserving location data stream clustering on mobile edge computing and cloud.
Veronika Stephanie, M. A. P. Chamikara, Ibrahim Khalil, Mohammed Atiquzzaman Inf. Syst. 101728 (2022).
Source: https://doi.org/10.1016/j.is.2021.101728
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs.
Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang IEEE Internet Things J. 12563-12572 (2022).
Source: https://doi.org/10.1109/JIOT.2021.3138989
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang, Xingfu Yan IEEE Internet Things J. 12209-12218 (2022).
Source: https://doi.org/10.1109/JIOT.2021.3134693
Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal IEEE Internet Things J. 3321-3332 (2022).
Source: https://doi.org/10.1109/JIOT.2021.3098007
Radial Basis Function Network with Differential Privacy.
Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mahathir Almashor, Alsharif Abuadbba Future Gener. Comput. Syst. 473-486 (2022).
Source: https://doi.org/10.1016/j.future.2021.09.013
Social Media Identity Deception Detection: A Survey.
Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil ACM Comput. Surv. 69:1-69:35 (2022).
Source: https://doi.org/10.1145/3446372
Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge.
Mohammad Saidur Rahman, Abdulatif Alabdulatif, Ibrahim Khalil Comput. Commun. 373-381 (2022).
Source: https://doi.org/10.1016/j.comcom.2022.06.013
Forward-Secure Edge Authentication for Graphs.
Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang Comput. J. 1653-1665 (2022).
Source: https://doi.org/10.1093/comjnl/bxab004
2021
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen SERVICES 11 (2021).
Source: https://doi.org/10.1109/SERVICES51467.2021.00022
Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security.
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi QSHINE 177-193 (2021).
Source: https://doi.org/10.1007/978-3-030-91424-0_11
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability.
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev QSHINE 57-74 (2021).
Source: https://doi.org/10.1007/978-3-030-91424-0_4
A Broker-Based Manufacturing Supply Chain Integration with Blockchain: Managing Odoo Workflows Using Hyperledger Fabric Smart Contracts.
Abdelhak Belhi, Houssem Gasmi, Assam Hammi, Abdelaziz Bouras, Bela�d Aouni, Ibrahim Khalil PLM (2) 371-385 (2021).
Source: https://doi.org/10.1007/978-3-030-94399-8_27
A Framework for Modelling Blockchain based Supply Chain Management System to ensure soundness of Smart Contract Workflow.
Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras HICSS 1-10 (2021).
Source: https://hdl.handle.net/10125/71295
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, Ibrahim Khalil IEEE Trans. Sustain. Comput. 66-79 (2021).
Source: https://doi.org/10.1109/TSUSC.2019.2906657
Privacy Preserving Location-Aware Personalized Web Service Recommendations.
Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam IEEE Trans. Serv. Comput. 791-804 (2021).
Source: https://doi.org/10.1109/TSC.2018.2839587
Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code.
Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi IEEE J. Biomed. Health Informatics 35-46 (2021).
Source: https://doi.org/10.1109/JBHI.2020.2988449
Blockchain-Enabled SLA Compliance for Crowdsourced Edge-Based Network Function Virtualization.
Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Netw. 58-65 (2021).
Source: https://doi.org/10.1109/MNET.011.2100086
Blockchain-Enabled Intelligent Vehicular Edge Computing.
Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Hung M. La, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Netw. 125-131 (2021).
Source: https://doi.org/10.1109/MNET.011.2000554
Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems.
Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman IEEE Netw. 116-123 (2021).
Source: https://doi.org/10.1109/MNET.011.2000219
A scalable blockchain based trust management in VANET routing protocol.
Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Hung Manh La, Ibrahim Khalil, Mohammed Atiquzzaman J. Parallel Distributed Comput. 144-156 (2021).
Source: https://doi.org/10.1016/j.jpdc.2021.02.024
Towards secure and practical consensus for blockchain based VANET.
Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Albert Y. Zomaya Inf. Sci. 170-187 (2021).
Source: https://doi.org/10.1016/j.ins.2020.07.060
ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study.
Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil Inf. Process. Manag. 102508 (2021).
Source: https://doi.org/10.1016/j.ipm.2021.102508
Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang IEEE Internet Things J. 11678-11689 (2021).
Source: https://doi.org/10.1109/JIOT.2021.3059570
PPaaS: Privacy Preservation as a Service.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe Comput. Commun. 192-205 (2021).
Source: https://doi.org/10.1016/j.comcom.2021.04.006
EdgeSOM: Distributed Hierarchical Edge-driven IoT Data Analytics Framework.
Kassem Bagher, Ibrahim Khalil, Abdulatif Alabdulatif, Mohammed Atiquzzaman Comput. Commun. 64-74 (2021).
Source: https://doi.org/10.1016/j.comcom.2021.02.021
Privacy preserving distributed machine learning with federated learning.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe Comput. Commun. 112-125 (2021).
Source: https://doi.org/10.1016/j.comcom.2021.02.014
Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System.
Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman IEEE Commun. Mag. 128-134 (2021).
Source: https://doi.org/10.1109/MCOM.001.2000679
Reputation-Based Miner Node Selection in Blockchain-Based Vehicular Edge Computing.
Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil IEEE Consumer Electron. Mag. 14-22 (2021).
Source: https://doi.org/10.1109/MCE.2020.3048312
2020
Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain.
Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras SecureComm (2) 391-402 (2020).
Source: https://doi.org/10.1007/978-3-030-63095-9_25
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang ProvSec 145-165 (2020).
Source: https://doi.org/10.1007/978-3-030-62576-4_8
BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City.
Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil PerCom Workshops 1-6 (2020).
Source: https://doi.org/10.1109/PerComWorkshops48775.2020.9156237
BACC: Blockchain-Based Access Control For Cloud Data.
Nasrin Sohrabi, Xun Yi, Zahir Tari, Ibrahim Khalil ACSW 10:1-10:10 (2020).
Source: https://doi.org/10.1145/3373017.3373027
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud.
Abdulatif Alabdulatif, Ibrahim Khalil, Albert Y. Zomaya, Zahir Tari, Xun Yi IEEE Trans. Parallel Distributed Syst. 2668-2681 (2020).
Source: https://doi.org/10.1109/TPDS.2020.2999407
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman IEEE Trans. Ind. Informatics 6092-6102 (2020).
Source: https://doi.org/10.1109/TII.2020.2974555
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption.
Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi J. Parallel Distributed Comput. 192-204 (2020).
Source: https://doi.org/10.1016/j.jpdc.2019.10.008
Lightweight privacy preservation for secondary users in cognitive radio networks.
Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil J. Netw. Comput. Appl. 102652 (2020).
Source: https://doi.org/10.1016/j.jnca.2020.102652
Efficient privacy preservation of big data for accurate data mining.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Ahmet �amtepe, Ibrahim Khalil Inf. Sci. 420-443 (2020).
Source: https://doi.org/10.1016/j.ins.2019.05.053
Local Differential Privacy for Deep Learning.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman IEEE Internet Things J. 5827-5842 (2020).
Source: https://doi.org/10.1109/JIOT.2019.2952146
Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption.
Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi Eng. Appl. Artif. Intell. 103737 (2020).
Source: https://doi.org/10.1016/j.engappai.2020.103737
Privacy Preserving Face Recognition Utilizing Differential Privacy.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe Comput. Secur. 101951 (2020).
Source: https://doi.org/10.1016/j.cose.2020.101951
Patient clustering using dynamic partitioning on correlated and uncertain biomedical data.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Heshan Kumarage Comput. Methods Programs Biomed. 105483 (2020).
Source: https://doi.org/10.1016/j.cmpb.2020.105483
An intelligent healthcare system with data priority based on multi vital biosignals.
Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman Comput. Methods Programs Biomed. 105126 (2020).
Source: https://doi.org/10.1016/j.cmpb.2019.105126
2019
ADS4all: Democratizing Authenticated Data Structures.
Nasser Alzahrani, Ibrahim Khalil, Xun Yi ICSOC Workshops 280-286 (2019).
Source: https://doi.org/10.1007/978-3-030-45989-5_24
A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud.
Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Tao Gu HICSS 1-10 (2019).
Source: https://hdl.handle.net/10125/59862
A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
Mohammad Saidur Rahman, Ibrahim Khalil, Mahawaga Arachchige Pathum Chamikara, Abdelaziz Bouras, Xun Yi BSCI 97-105 (2019).
Source: https://doi.org/10.1145/3327960.3332392
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui Veh. Commun. 16-27 (2019).
Source: https://doi.org/10.1016/j.vehcom.2018.11.001
Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Mohammad Saidur Rahman, Ibrahim Khalil, Abdulatif Alabdulatif, Xun Yi Knowl. Based Syst. 104-115 (2019).
Source: https://doi.org/10.1016/j.knosys.2019.05.022
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya J. Parallel Distributed Comput. 57-70 (2019).
Source: https://doi.org/10.1016/j.jpdc.2019.01.013
Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
Abdulatif Alabdulatif, Ibrahim Khalil, Heshan Kumarage, Albert Y. Zomaya, Xun Yi J. Parallel Distributed Comput. 209-223 (2019).
Source: https://doi.org/10.1016/j.jpdc.2017.12.011
Privacy-preserving aggregation for cooperative spectrum sensing.
Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil J. Netw. Comput. Appl. 54-64 (2019).
Source: https://doi.org/10.1016/j.jnca.2019.05.011
A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi Int. J. Inf. Manag. 276-288 (2019).
Source: https://doi.org/10.1016/j.ijinfomgt.2018.08.011
A new privacy-preserving authentication protocol for anonymous web browsing.
Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng Concurr. Comput. Pract. Exp. N/A (2019).
Source: https://doi.org/10.1002/cpe.4706
An efficient and scalable privacy preserving algorithm for big data and data streams.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Ahmet �amtepe, Ibrahim Khalil Comput. Secur. N/A (2019).
Source: https://doi.org/10.1016/j.cose.2019.101570
Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare.
Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman Comput. Networks 127-143 (2019).
Source: https://doi.org/10.1016/j.comnet.2018.11.002
Real-time Secure Health Surveillance for Smarter Health Communities.
Abdulatif Alabdulatif, Ibrahim Khalil, Abdur Rahim Mohammad Forkan, Mohammed Atiquzzaman IEEE Commun. Mag. 122-129 (2019).
Source: https://doi.org/10.1109/MCOM.2017.1700547
Secure Edge of Things for Smart Healthcare Surveillance Framework.
Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi, Mohsen Guizani IEEE Access 31010-31021 (2019).
Source: https://doi.org/10.1109/ACCESS.2019.2899323
2018
An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal WISE (1) 111-126 (2018).
Source: https://doi.org/10.1007/978-3-030-02922-7_8
GazeRevealer: Inferring Password Using Smartphone Front Camera.
Yao Wang, Wan-Dong Cai, Tao Gu, Wei Shao, Ibrahim Khalil, Xianghua Xu MobiQuitous 254-263 (2018).
Source: https://doi.org/10.1145/3286978.3287026
Gaussian Approximation-Based Lossless Compression of Smart Meter Readings.
Alsharif Abuadbba, Ibrahim Khalil, Xinghuo Yu IEEE Trans. Smart Grid 5047-5056 (2018).
Source: https://doi.org/10.1109/TSG.2017.2679111
Efficient data perturbation for privacy preserving and accurate data stream mining.
Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil Pervasive Mob. Comput. 1-19 (2018).
Source: https://doi.org/10.1016/j.pmcj.2018.05.003
Fast and peer-to-peer vital signal learning system for cloud-based healthcare.
Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman Future Gener. Comput. Syst. 220-233 (2018).
Source: https://doi.org/10.1016/j.future.2018.05.042
Determining Anxiety in Obsessive Compulsive Disorder through Behavioural Clustering and Variations in Repetition Intensity.
Conor Cameron, Ibrahim Khalil, David Castle Comput. Methods Programs Biomed. 65-74 (2018).
Source: https://doi.org/10.1016/j.cmpb.2018.03.019
Privacy Preserving User Based Web Service Recommendations.
Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam IEEE Access 56647-56657 (2018).
Source: https://doi.org/10.1109/ACCESS.2018.2871447
Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
Shahriar Badsha, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman IEEE Access 42119-42130 (2018).
Source: https://doi.org/10.1109/ACCESS.2018.2856299
Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Abdulatif Alabdulatif, Ibrahim Khalil, Mark C. Reynolds, Heshan Kumarage, Xun Yi PACIS 289 (2017).
Source: https://aisel.aisnet.org/pacis2017/289
Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Hai Dong PACIS 230 (2017).
Source: http://aisel.aisnet.org/pacis2017/230
Private Recommendations Generation for Vertically Partitioned Datasets.
Shahriar Badsha, Xun Yi, Ibrahim Khalil, Andrei Kelarev PACIS 163 (2017).
Source: http://aisel.aisnet.org/pacis2017/163
BDCaM: Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Ayman Ibaida, Zahir Tari IEEE Trans. Cloud Comput. 628-641 (2017).
Source: https://doi.org/10.1109/TCC.2015.2440269
Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management.
Uthpala Subodhani Premarathne, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya IEEE Trans. Cloud Comput. 290-302 (2017).
Source: https://doi.org/10.1109/TCC.2015.2404816
Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
Alsharif Abuadbba, Ibrahim Khalil IEEE Trans. Biomed. Eng. 2186-2195 (2017).
Source: https://doi.org/10.1109/TBME.2016.2631885
PEACE-Home: Probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil Pervasive Mob. Comput. 296-311 (2017).
Source: https://doi.org/10.1016/j.pmcj.2016.12.009
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Xun Yi J. Comput. Syst. Sci. 28-45 (2017).
Source: https://doi.org/10.1016/j.jcss.2017.03.001
Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi IET Wirel. Sens. Syst. 182-190 (2017).
Source: https://doi.org/10.1049/iet-wss.2017.0061
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography.
Vu Mai, Ibrahim Khalil Future Gener. Comput. Syst. 327-338 (2017).
Source: https://doi.org/10.1016/j.future.2016.06.003
ViSiBiD: A learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Mohammed Atiquzzaman Comput. Networks 244-257 (2017).
Source: https://doi.org/10.1016/j.comnet.2016.12.019
A clinical decision-making mechanism for context-aware and patient-specific remote monitoring systems using the correlations of multiple vital signs.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil Comput. Methods Programs Biomed. 1-16 (2017).
Source: https://doi.org/10.1016/j.cmpb.2016.10.018
Reliable delay-sensitive spectrum handoff management for re-entrant secondary users.
Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman Ad Hoc Networks 85-94 (2017).
Source: https://doi.org/10.1016/j.adhoc.2017.04.008
2016
A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil PerCom 1-9 (2016).
Source: https://doi.org/10.1109/PERCOM.2016.7456519
Securing Body Sensor Network with ECG.
Xuechao Yang, Xun Yi, Ibrahim Khalil, Fengling Han, Zahir Tari MoMM 298-306 (2016).
Source: http://dl.acm.org/citation.cfm?id=3007121
kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering.
Abdulmohsen Almalawi, Adil Fahad, Zahir Tari, Muhammad Aamir Cheema, Ibrahim Khalil ICDE 1572-1573 (2016).
Source: https://doi.org/10.1109/ICDE.2016.7498431
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman, Ibrahim Habib, Jiankun Hu Wirel. Commun. Mob. Comput. 59-78 (2016).
Source: https://doi.org/10.1002/wcm.2488
kNNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering.
Abdul Mohsen Almalawi, Adil Fahad, Zahir Tari, Muhammad Aamir Cheema, Ibrahim Khalil IEEE Trans. Knowl. Data Eng. 68-81 (2016).
Source: https://doi.org/10.1109/TKDE.2015.2460735
A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission.
Naimah Yaakob, Ibrahim Khalil IEEE J. Biomed. Health Informatics 669-681 (2016).
Source: https://doi.org/10.1109/JBHI.2015.2406884
ID2S Password-Authenticated Key Exchange Protocols.
Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya IEEE Trans. Computers 3687-3701 (2016).
Source: https://doi.org/10.1109/TC.2016.2553031
A Practical Privacy-Preserving Recommender System.
Shahriar Badsha, Xun Yi, Ibrahim Khalil Data Sci. Eng. 161-177 (2016).
Source: https://doi.org/10.1007/s41019-016-0020-2
Hybrid Cryptographic Access Control for Cloud-Based EHR Systems.
Uthpala Subodhani Premarathne, Alsharif Abuadbba, Abdulatif Alabdulatif, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Rajkumar Buyya IEEE Cloud Comput. 58-64 (2016).
Source: https://doi.org/10.1109/MCC.2016.76
Secure Data Analytics for Cloud-Integrated Internet of Things Applications.
Heshan Kumarage, Ibrahim Khalil, Abdulatif Alabdulatif, Zahir Tari, Xun Yi IEEE Cloud Comput. 46-56 (2016).
Source: https://doi.org/10.1109/MCC.2016.30
Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
Alsharif Abuadbba, Ibrahim Khalil, Ayman Ibaida, Mohammed Atiquzzaman Ad Hoc Networks 30-46 (2016).
Source: https://doi.org/10.1016/j.adhoc.2015.11.002
Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid.
Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman Ad Hoc Networks 15-29 (2016).
Source: https://doi.org/10.1016/j.adhoc.2015.12.004
2015
Cooperative Web Caching Using Dynamic Interest-Tagged Filtered Bloom Filters.
Holly Alexander, Ibrahim Khalil, Conor Cameron, Zahir Tari, Albert Y. Zomaya IEEE Trans. Parallel Distributed Syst. 2956-2969 (2015).
Source: https://doi.org/10.1109/TPDS.2014.2363458
Enhancing Availability in Content Delivery Networks for Mobile Platforms.
Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Sartaj Sahni IEEE Trans. Parallel Distributed Syst. 2247-2257 (2015).
Source: https://doi.org/10.1109/TPDS.2013.2297927
Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria.
Heshan Kumarage, Ibrahim Khalil, Zahir Tari IEEE Trans. Computers 2573-2585 (2015).
Source: https://doi.org/10.1109/TC.2014.2366755
By-Passing Infected Areas in Wireless Sensor Networks Using BPR.
Naimah Yaakob, Ibrahim Khalil, Heshan Kumarage, Mohammed Atiquzzaman, Zahir Tari IEEE Trans. Computers 1594-1606 (2015).
Source: https://doi.org/10.1109/TC.2014.2345400
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Zahir Tari, Sebti Foufou, Abdelaziz Bouras Pattern Recognit. 628-641 (2015).
Source: https://doi.org/10.1016/j.patcog.2014.07.007
Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
Alsharif Abuadbba, Ibrahim Khalil, Mohammed Atiquzzaman Pervasive Mob. Comput. 58-70 (2015).
Source: https://doi.org/10.1016/j.pmcj.2015.02.003
Secure and reliable surveillance over cognitive radio sensor networks in smart grid.
Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman Pervasive Mob. Comput. 3-15 (2015).
Source: https://doi.org/10.1016/j.pmcj.2015.05.001
Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
Alsharif Abuadbba, Ibrahim Khalil Inf. Syst. 224-236 (2015).
Source: https://doi.org/10.1016/j.is.2014.09.004
Multi-objective optimisation for selective packet discarding in wireless sensor network.
Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman IET Wirel. Sens. Syst. 124-136 (2015).
Source: https://doi.org/10.1049/iet-wss.2014.0020
Multi-Binomial mixes: A proposal for secure and efficient anonymous communication.
Shaahin Madani, Ibrahim Khalil Comput. Networks 41-53 (2015).
Source: https://doi.org/10.1016/j.comnet.2015.10.007
Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications.
Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman Comput. Networks 161-177 (2015).
Source: https://doi.org/10.1016/j.comnet.2015.06.002
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
Zahir Tari, Xun Yi, Uthpala Subodhani Premarathne, Peter Bert�k, Ibrahim Khalil IEEE Cloud Comput. 30-38 (2015).
Source: https://doi.org/10.1109/MCC.2015.45
2014
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems.
Uthpala Subodhani Premarathne, Ibrahim Khalil TrustCom 221-228 (2014).
Source: https://doi.org/10.1109/TrustCom.2014.33
CluClas: Hybrid clustering-classification approach for accurate and efficient network classification.
Adil Fahad, Kurayman Alharthi, Zahir Tari, Abdulmohsen Almalawi, Ibrahim Khalil LCN 168-176 (2014).
Source: https://doi.org/10.1109/LCN.2014.6925769
ECG Biometric with Abnormal Cardiac Conditions in Remote Monitoring System.
Khairul Azami Sidek, Ibrahim Khalil, Herbert F. Jelinek IEEE Trans. Syst. Man Cybern. Syst. 1498-1509 (2014).
Source: https://doi.org/10.1109/TSMC.2014.2336842
A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis.
Adil Fahad, Najlaa Alshatri, Zahir Tari, Abdullah Alamri, Ibrahim Khalil, Albert Y. Zomaya, Sebti Foufou, Abdelaziz Bouras IEEE Trans. Emerg. Top. Comput. 267-279 (2014).
Source: https://doi.org/10.1109/TETC.2014.2330519
Garbled Routing (GR): A generic framework towards unification of anonymous communication systems.
Shaahin Madani, Ibrahim Khalil J. Netw. Comput. Appl. 183-195 (2014).
Source: https://doi.org/10.1016/j.jnca.2014.05.005
Data mining in mobile ECG based biometric identification.
Khairul Azami Sidek, Vu Mai, Ibrahim Khalil J. Netw. Comput. Appl. 83-91 (2014).
Source: https://doi.org/10.1016/j.jnca.2014.04.008
Accurate positioning using long range active RFID technology to assist visually impaired people.
Saleh Alghamdi, Ron G. van Schyndel, Ibrahim Khalil J. Netw. Comput. Appl. 135-147 (2014).
Source: https://doi.org/10.1016/j.jnca.2013.10.015
A distributed aggregation and fast fractal clustering approach for SOAP traffic.
Dhiah Al-Shammary, Ibrahim Khalil, Zahir Tari J. Netw. Comput. Appl. 1-14 (2014).
Source: https://doi.org/10.1016/j.jnca.2013.10.001
PileCast: Multiple bit rate live video streaming over BitTorrent.
Aukrit Chadagorn, Ibrahim Khalil, Conor Cameron, Zahir Tari J. Netw. Comput. Appl. 167-178 (2014).
Source: https://doi.org/10.1016/j.jnca.2013.06.001
An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content.
Conor Cameron, Ibrahim Khalil, Zahir Tari J. Netw. Comput. Appl. 293-314 (2014).
Source: https://doi.org/10.1016/j.jnca.2013.03.005
Data summarization for network traffic monitoring.
Demetris Hoplaros, Zahir Tari, Ibrahim Khalil J. Netw. Comput. Appl. 194-205 (2014).
Source: https://doi.org/10.1016/j.jnca.2013.02.021
PPFSCADA: Privacy preserving framework for SCADA data publishing.
Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood Future Gener. Comput. Syst. 496-511 (2014).
Source: https://doi.org/10.1016/j.future.2014.03.002
An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion.
Adil Fahad, Zahir Tari, Ibrahim Khalil, Abdulmohsen Almalawi, Albert Y. Zomaya Future Gener. Comput. Syst. 156-169 (2014).
Source: https://doi.org/10.1016/j.future.2013.09.015
CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living.
Abdur Forkan, Ibrahim Khalil, Zahir Tari Future Gener. Comput. Syst. 114-127 (2014).
Source: https://doi.org/10.1016/j.future.2013.07.009
Cloud enabled fractal based ECG compression in wireless body sensor networks.
Ayman Ibaida, Dhiah Al-Shammary, Ibrahim Khalil Future Gener. Comput. Syst. 91-101 (2014).
Source: https://doi.org/10.1016/j.future.2013.12.025
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems.
Abdulmohsen Almalawi, Xinghuo Yu, Zahir Tari, Adil Fahad, Ibrahim Khalil Comput. Secur. 94-110 (2014).
Source: https://doi.org/10.1016/j.cose.2014.07.005
Load-sensitive dynamic workflow re-orchestration and optimisation for faster patient healthcare.
Christopher L. Meli, Ibrahim Khalil, Zahir Tari Comput. Methods Programs Biomed. 1-14 (2014).
Source: https://doi.org/10.1016/j.cmpb.2013.06.019
Securing Big Data Applications in the Cloud [Guest editors' introduction].
Bharat K. Bhargava, Ibrahim Khalil, Ravi S. Sandhu IEEE Cloud Comput. 24-26 (2014).
Source: https://doi.org/10.1109/MCC.2014.65
2013
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems.
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil TrustCom/ISPA/IUCC 292-301 (2013).
Source: https://doi.org/10.1109/TrustCom.2013.40
Garbled Routing (GR): Towards Unification of Anonymous Networks.
Shaahin Madani, Ibrahim Khalil TrustCom/ISPA/IUCC 50-57 (2013).
Source: https://doi.org/10.1109/TrustCom.2013.10
Turbo-coded HARQ scheme in multi-hop cooperative wireless networks.
Ibrahim Khalil, Adnan Ahmed Khan WMNC 1-4 (2013).
Source: https://doi.org/10.1109/WMNC.2013.6549042
SCADAVT-A framework for SCADA security testbed based on virtualization technology.
Abdulmohsen Almalawi, Zahir Tari, Ibrahim Khalil, Adil Fahad LCN 639-646 (2013).
Source: https://doi.org/10.1109/LCN.2013.6761301
Protection of electronic health records (EHRs) in cloud.
Abdulatif Alabdulatif, Ibrahim Khalil, Vu Mai EMBC 4191-4194 (2013).
Source: https://doi.org/10.1109/EMBC.2013.6610469
Steganography-based access control to medical data hidden in electrocardiogram.
Vu Mai, Ibrahim Khalil, Ayman Ibaida EMBC 1302-1305 (2013).
Source: https://doi.org/10.1109/EMBC.2013.6609747
Preference based load balancing as an outpatient appointment scheduling aid.
Uthpala Subodhani Premarathne, Fengling Han, Ibrahim Khalil, Zahir Tari EMBC 1298-1301 (2013).
Source: https://doi.org/10.1109/EMBC.2013.6609746
Context-aware Cardiac Monitoring for Early Detection of Heart Diseases.
Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Zahir Tari CinC 277-280 (2013).
Source: http://www.cinc.org/archives/2013/pdf/0277.pdf
Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.
Ayman Ibaida, Ibrahim Khalil IEEE Trans. Biomed. Eng. 3322-3330 (2013).
Source: https://doi.org/10.1109/TBME.2013.2264539
Automatic and Autonomous Load Management in Peer-to-Peer Virtual Environments.
Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya IEEE J. Sel. Areas Commun. 310-324 (2013).
Source: https://doi.org/10.1109/JSAC.2013.SUP.0513028
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling.
Heshan Kumarage, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya J. Parallel Distributed Comput. 790-806 (2013).
Source: https://doi.org/10.1016/j.jpdc.2013.02.004
Fractal self-similarity measurements based clustering technique for SOAP Web messages.
Dhiah Al-Shammary, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya J. Parallel Distributed Comput. 664-676 (2013).
Source: https://doi.org/10.1016/j.jpdc.2013.01.005
Toward an efficient and scalable feature selection approach for internet traffic classification.
Adil Fahad, Zahir Tari, Ibrahim Khalil, Ibrahim Habib, Hussein M. Alnuweiri Comput. Networks 2040-2057 (2013).
Source: https://doi.org/10.1016/j.comnet.2013.04.005
Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.
Khairul Azami Sidek, Ibrahim Khalil Comput. Methods Programs Biomed. 13-25 (2013).
Source: https://doi.org/10.1016/j.cmpb.2012.08.015
2012
Safe trajectory estimation at a pedestrian crossing to assist visually impaired people.
Saleh Alghamdi, Ron G. van Schyndel, Ibrahim Khalil EMBC 5114-5117 (2012).
Source: https://doi.org/10.1109/EMBC.2012.6347144
Biometric sample extraction using Mahalanobis distance in Cardioid based graph using electrocardiogram signals.
Khairul Azami Sidek, Ibrahim Khalil EMBC 3396-3399 (2012).
Source: https://doi.org/10.1109/EMBC.2012.6346694
Redundancy-aware SOAP messages compression and aggregation for enhanced performance.
Dhiah Al-Shammary, Ibrahim Khalil J. Netw. Comput. Appl. 365-381 (2012).
Source: https://doi.org/10.1016/j.jnca.2011.08.004
Fully peer-to-peer virtual environments with 3D Voronoi diagrams.
Mahathir Almashor, Ibrahim Khalil Computing 679-700 (2012).
Source: https://doi.org/10.1007/s00607-012-0197-9
2011
Clustering SOAP Web Services on Internet Computing Using Fast Fractals.
Dhiah Al-Shammary, Ibrahim Khalil, Loay Edwar George NCA 366-371 (2011).
Source: https://doi.org/10.1109/NCA.2011.65
Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams.
Mahathir Almashor, Ibrahim Khalil NCA 235-240 (2011).
Source: https://doi.org/10.1109/NCA.2011.40
On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Naimah Yaakob, Ibrahim Khalil, Jiankun Hu MobiHealth 16-23 (2011).
Source: https://doi.org/10.1007/978-3-642-29734-2_3
Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System.
Ibrahim Khalil, Adnan Ahmed Khan, Zohaib-Ur-Rehman FIT 253-257 (2011).
Source: https://doi.org/10.1109/FIT.2011.54
Real-time wearable telecardiology from representative signals.
Christopher L. Meli, George Fernandez, Ibrahim Khalil EMBC 4967-4971 (2011).
Source: https://doi.org/10.1109/IEMBS.2011.6091231
Person identification in irregular cardiac conditions using electrocardiogram signals.
Khairul Azami Sidek, Ibrahim Khalil EMBC 3772-3775 (2011).
Source: https://doi.org/10.1109/IEMBS.2011.6090644
ECG biometric using multilayer perceptron and radial basis function neural networks.
Vu Mai, Ibrahim Khalil, Christopher L. Meli EMBC 2745-2748 (2011).
Source: https://doi.org/10.1109/IEMBS.2011.6090752
Dynamic Fractal Clustering Technique for SOAP Web Messages.
Dhiah Al-Shammary, Ibrahim Khalil IEEE SCC 96-103 (2011).
Source: https://doi.org/10.1109/SCC.2011.15
Diagnosis of Cardiovascular Abnormalities From Compressed ECG: A Data Mining-Based Approach.
Fahim K. Sufi, Ibrahim Khalil IEEE Trans. Inf. Technol. Biomed. 33-39 (2011).
Source: https://doi.org/10.1109/TITB.2010.2094197
Cardioids-based faster authentication and diagnosis of remote cardiovascular patients.
Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib Secur. Commun. Networks 1351-1368 (2011).
Source: https://doi.org/10.1002/sec.262
An embedded DSP hardware encryption module for secure e-commerce transactions.
Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil Secur. Commun. Networks 902-909 (2011).
Source: https://doi.org/10.1002/sec.221
A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Fahim K. Sufi, Fengling Han, Ibrahim Khalil, Jiankun Hu Secur. Commun. Networks 515-524 (2011).
Source: https://doi.org/10.1002/sec.226
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
Jiankun Hu, Ibrahim Khalil, Song Han, Abdun Naser Mahmood J. Netw. Comput. Appl. 1150-1159 (2011).
Source: https://doi.org/10.1016/j.jnca.2010.11.013
Faster person identification using compressed ECG in time critical wireless telecardiology applications.
Fahim K. Sufi, Ibrahim Khalil J. Netw. Comput. Appl. 282-293 (2011).
Source: https://doi.org/10.1016/j.jnca.2010.07.004
Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood J. Medical Syst. 1349-1358 (2011).
Source: https://doi.org/10.1007/s10916-009-9412-4
A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood Expert Syst. Appl. 4705-4713 (2011).
Source: https://doi.org/10.1016/j.eswa.2010.08.149
2010
Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams.
Mahathir Almashor, Ibrahim Khalil, Geoff Leach NCA 253-256 (2010).
Source: https://doi.org/10.1109/NCA.2010.46
Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Naimah Yaakob, Ibrahim Khalil, Jiankun Hu NCA 210-213 (2010).
Source: https://doi.org/10.1109/NCA.2010.37
SOAP Web Services Compression Using Variable and Fixed Length Coding.
Dhiah Al-Shammary, Ibrahim Khalil NCA 84-91 (2010).
Source: https://doi.org/10.1109/NCA.2010.18
Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments.
Mahathir Almashor, Ibrahim Khalil ICPADS 839-844 (2010).
Source: https://doi.org/10.1109/ICPADS.2010.97
Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams.
Mahathir Almashor, Ibrahim Khalil HiPC 1-10 (2010).
Source: https://doi.org/10.1109/HIPC.2010.5713197
Polynomial distance measurement for ECG based biometric authentication.
Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib Secur. Commun. Networks 303-319 (2010).
Source: https://doi.org/10.1002/sec.76
2009
Novel methods of faster cardiovascular diagnosis in wireless telecardiology.
Fahim K. Sufi, Qiang Fang, Ibrahim Khalil, Seedahmed S. Mahmoud IEEE J. Sel. Areas Commun. 537-552 (2009).
Source: https://doi.org/10.1109/JSAC.2009.090515
Cooperative Remote Video Consultation on Demand for e-Patients.
Ibrahim Khalil, Fahim K. Sufi J. Medical Syst. 475-483 (2009).
Source: https://doi.org/10.1007/s10916-008-9208-y
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking.
Fahim K. Sufi, Ibrahim Khalil J. Medical Syst. 121-132 (2009).
Source: https://doi.org/10.1007/s10916-008-9172-6
Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism.
Fahim K. Sufi, Ibrahim Khalil Secur. Commun. Networks 389-405 (2008).
Source: https://doi.org/10.1002/sec.44
A novel wavelet packet-based anti-spoofing technique to secure ECG data.
Fahim K. Sufi, Seedahmed S. Mahmoud, Ibrahim Khalil Int. J. Biom. 191-208 (2008).
Source: https://doi.org/10.1504/IJBM.2008.020144
An Architecture for Distributed Content Delivery Network.
Jaison Paul Mulerikkal, Ibrahim Khalil ICON 359-364 (2007).
Source: https://doi.org/10.1109/ICON.2007.4444113
An End-Systems Supported Highly Distributed Content Delivery Network.
Jaison Paul Mulerikkal, Ibrahim Khalil ICDCIT 172-183 (2007).
Source: https://doi.org/10.1007/978-3-540-77115-9_18
2006
Making Application Layer Multicast Reliableis Feasible.
Bin Rong, Ibrahim Khalil, Zahir Tari LCN 483-490 (2006).
Source: https://doi.org/10.1109/LCN.2006.322143
An Adaptive Membership Algorithm for Application Layer Multicast.
Bin Rong, Ibrahim Khalil, Zahir Tari ICNS 35 (2006).
Source: https://doi.org/10.1109/ICNS.2006.22
Reliability Enhanced Large-Scale Application Layer Multicast.
Bin Rong, Ibrahim Khalil, Zahir Tari GLOBECOM N/A (2006).
Source: https://doi.org/10.1109/GLOCOM.2006.247
Load Sharing in Peer-to-Peer Networks using Dynamic Replication.
Sathish Rajasekhar, Bin Rong, Kwong Yuen Lai, Ibrahim Khalil, Zahir Tari AINA (1) 1011-1016 (2006).
Source: https://doi.org/10.1109/AINA.2006.207
Probabilistic QoS Routing inWiFi P2P Networks.
Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari AINA (1) 811-816 (2006).
Source: https://doi.org/10.1109/AINA.2006.275
2005
A Gossip-based Membership Management Algorithm for Large-Scale Peer-to-Peer Media Streaming.
Bin Rong, Ibrahim Khalil, Zahir Tari LCN 486-487 (2005).
Source: https://doi.org/10.1109/LCN.2005.7
2004
A Scalable and Roboust QoS Architecture for WiFi P2P Networks.
Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari ICDCIT 65-74 (2004).
Source: https://doi.org/10.1007/978-3-540-30555-2_9
2002
Automated service provisioning in heterogeneous large-scale environment.
Ibrahim Khalil, Torsten Braun NOMS 575-588 (2002).
Source: https://doi.org/10.1109/NOMS.2002.1015609
Edge Provisioning and Fairness in VPN-DiffServ Networks.
Ibrahim Khalil, Torsten Braun J. Netw. Syst. Manag. 11-37 (2002).
Source: https://doi.org/10.1023/A:1014449424633
2001
Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains.
Ibrahim Khalil, Torsten Braun MMNS 160-174 (2001).
Source: https://doi.org/10.1007/3-540-45508-6_12
A Range-Based SLA and Edge Driven Virtual Core Provisioning in DiffServ-VPNs.
Ibrahim Khalil, Torsten Braun LCN 12-21 (2001).
Source: https://doi.org/10.1109/LCN.2001.990763
Management of quality of service enabled VPNs.
Torsten Braun, Manuel G�nter, Ibrahim Khalil IEEE Commun. Mag. 90-98 (2001).
Source: https://doi.org/10.1109/35.920862
2000
Implementation of a Bandwidth Broker for Dynamic End-to-End Resource Reservation in Outsourced Virtual Private Networks.
Ibrahim Khalil, Torsten Braun LCN 511-519 (2000).
Source: https://doi.org/10.1109/LCN.2000.891092
An Architecture for Managing QoS-Enabled VPNs over the Internet.
Manuel G�nter, Torsten Braun, Ibrahim Khalil LCN 122-131 (1999).
Source: https://doi.org/10.1109/LCN.1999.802006
1998
Differentiated Internet Services.
Florian Baumgartner, Torsten Braun, Hans Joachim Einsiedler, Ibrahim Khalil Wide Area Networks and High Performance Computing 37-59 (1998).
Source: https://doi.org/10.1007/BFb0110078