


default search action
Ali Chehab
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j102]Zeina El Kojok, Hadi Al-Khansa, Fouad Trad, Ali Chehab:
Augmenting a spine CT scans dataset using VAEs, GANs, and transfer learning for improved detection of vertebral compression fractures. Comput. Biol. Medicine 184: 109446 (2025) - 2024
- [j101]Fouad Trad
, Ali Chehab
:
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models. Mach. Learn. Knowl. Extr. 6(1): 367-384 (2024) - [j100]Hassan N. Noura
, Reem Melki, Mohammad M. Mansour, Ali Chehab
:
Lightweight and secure cipher scheme for multi-homed systems. Wirel. Networks 30(7): 6273-6290 (2024) - [j99]Hassan N. Noura
, Reem Melki, Ali Chehab
, Javier Hernandez Fernandez
:
Efficient and secure message authentication algorithm at the physical layer. Wirel. Networks 30(7): 6291-6305 (2024) - [c158]Ola Salman, Hassan N. Noura, Ali Chehab:
SERS: Secure & Efficient Random and Symbol Linear Network Coding Schemes. IWCMC 2024: 1022-1029 - [i11]Fouad Trad, Ali Chehab:
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications. CoRR abs/2403.17787 (2024) - [i10]Fouad Trad, Ali Chehab:
To Ensemble or Not: Assessing Majority Voting Strategies for Phishing Detection with Large Language Models. CoRR abs/2412.00166 (2024) - [i9]Fouad Trad, Ali Chehab:
Large Multimodal Agents for Accurate Phishing Detection with Enhanced Token Optimization and Cost Reduction. CoRR abs/2412.02301 (2024) - [i8]Fouad Trad, Ryan Yammine, Jana Charafeddine, Marlene Chakhtoura, Maya Rahme, Ghada El-Hajj Fuleihan, Ali Chehab:
Streamlining Systematic Reviews: A Novel Application of Large Language Models. CoRR abs/2412.15247 (2024) - 2023
- [j98]Hassan Noura, Ola Salman, Raphaël Couturier
, Ali Chehab
:
LESCA: LightwEight Stream Cipher Algorithm for emerging systems. Ad Hoc Networks 138: 102999 (2023) - [j97]Mahdi Chehimi
, Mohamad Khattar Awad, Mohammed Al-Husseini
, Ali Chehab:
Machine learning-based anti-jamming technique at the physical layer. Concurr. Comput. Pract. Exp. 35(9) (2023) - [j96]Hassan N. Noura
, Ola Salman, Ali Chehab
:
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms. J. Inf. Secur. Appl. 76: 103514 (2023) - [c157]Hadi Noureddine
, Omar Bekdache
, Mohamad Al Tawil
, Rouwaida Kanj
, Ali Chehab
, Mohammed E. Fouda
, Ahmed M. Eltawil
:
High-Density FeFET-based CAM Cell Design Via Multi-Dimensional Encoding. ACM Great Lakes Symposium on VLSI 2023: 403-407 - 2022
- [j95]Hassan N. Noura
, Ola Salman, Raphaël Couturier, Ali Chehab
:
Efficient and secure selective cipher scheme for MIoT compressed images. Ad Hoc Networks 135: 102928 (2022) - [j94]Ola Salman
, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab
:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. Ann. des Télécommunications 77(5-6): 395-406 (2022) - [j93]Ola Salman, Imad H. Elhajj, Ali Chehab
, Ayman I. Kayssi:
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning. Comput. Networks 204: 108684 (2022) - [j92]Ola Salman
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j91]Jean-Paul A. Yaacoub
, Hassan N. Noura
, Ola Salman
, Ali Chehab
:
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Sec. 21(1): 115-158 (2022) - [j90]Jean-Paul A. Yaacoub
, Hassan N. Noura
, Ola Salman
, Ali Chehab
:
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet Things 19: 100544 (2022) - [j89]Hassan N. Noura
, Ola Salman
, Raphaël Couturier
, Ali Chehab
:
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet Things J. 9(18): 17885-17900 (2022) - [j88]Hassan N. Noura
, Reem Melki
, Ali Chehab
:
Network coding and MPTCP: Enhancing security and performance in an SDN environment. J. Inf. Secur. Appl. 66: 103165 (2022) - [j87]Hassan N. Noura
, Ali Chehab
:
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms. J. Inf. Secur. Appl. 68: 103264 (2022) - [j86]Hassan N. Noura
, Ola Salman
, Raphaël Couturier, Ali Chehab
:
Novel one round message authentication scheme for constrained IoT devices. J. Ambient Intell. Humaniz. Comput. 13(1): 483-499 (2022) - [j85]Lama Shaer, Rouwaida Kanj
, Rajiv V. Joshi, Ali Chehab
:
Group LARS-Based Iterative Reweighted Least Squares Methodology for Efficient Statistical Modeling of Memory Designs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(12): 5722-5726 (2022) - [j84]Reem Melki
, Hassan N. Noura
, Ali Chehab
:
An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security. Telecommun. Syst. 79(1): 17-32 (2022) - [j83]Hassan N. Noura
, Ola Salman
, Raphaël Couturier, Ali Chehab
:
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems. Veh. Commun. 34: 100416 (2022) - [c156]Fouad Trad, Ali Hussein, Ali Chehab:
Using Siamese Neural Networks for Efficient and Accurate IoT Device Identification. FMEC 2022: 1-7 - [c155]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability. SITIS 2022: 45-52 - [c154]Reem Melki, Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation. SITIS 2022: 53-60 - 2021
- [j82]Reem Melki
, Hassan N. Noura
, Ali Chehab
:
Physical layer security for NOMA: limitations, issues, and recommendations. Ann. des Télécommunications 76(5-6): 375-397 (2021) - [j81]Hassan N. Noura
, Reem Melki
, Ali Chehab
, Javier Hernandez Fernandez
:
Efficient and robust data availability solution for hybrid PLC/RF systems. Comput. Networks 185: 107675 (2021) - [j80]Jean-Paul A. Yaacoub
, Javier Hernandez Fernandez
, Hassan N. Noura
, Ali Chehab
:
Security of Power Line Communication systems: Issues, limitations and existing solutions. Comput. Sci. Rev. 39: 100331 (2021) - [j79]Hassan N. Noura
, Reem Melki
, Ali Chehab
:
Efficient data confidentiality scheme for 5G wireless NOMA communications. J. Inf. Secur. Appl. 58: 102781 (2021) - [j78]Louma Chaddad, Ali Chehab
, Ayman I. Kayssi:
OPriv: Optimizing Privacy Protection for Network Traffic. J. Sens. Actuator Networks 10(3): 38 (2021) - [j77]Hassan N. Noura
, Ola Salman, Nesrine Kaaniche
, Nicolas Sklavos
, Ali Chehab
, Raphaël Couturier:
TRESC: Towards redesigning existing symmetric ciphers. Microprocess. Microsystems 87: 103478 (2021) - [j76]Ola Salman
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Data representation for CNN based internet traffic classification: a comparative study. Multim. Tools Appl. 80(11): 16951-16977 (2021) - [j75]Reem Melki
, Hassan N. Noura
, Javier Hernandez Fernandez
, Ali Chehab
:
Message authentication algorithm for OFDM communication systems. Telecommun. Syst. 76(3): 403-422 (2021) - [j74]Louma Chaddad, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. ACM Trans. Priv. Secur. 24(3): 22:1-22:23 (2021) - [j73]Hassan N. Noura
, Reem Melki
, Rouwaida Kanj, Ali Chehab
:
Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme. Wirel. Networks 27(1): 557-574 (2021) - [c153]Hassan Noura, Ali Chehab
:
Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks. ISNCC 2021: 1-7 - [c152]Iman Dernayka, Ali Chehab
:
Blockchain Development Platforms: Performance Comparison. NTMS 2021: 1-6 - [c151]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab
:
Centralization vs. De-Centralization: Where Does the Network Control Plane Stand? SDS 2021: 1-6 - [i7]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
A Survey on Ethical Hacking: Issues and Challenges. CoRR abs/2103.15072 (2021) - [i6]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. CoRR abs/2103.17028 (2021) - 2020
- [j72]Hassan N. Noura, Ola Salman, Ali Chehab
, Raphaël Couturier:
DistLog: A distributed logging scheme for IoT forensics. Ad Hoc Networks 98 (2020) - [j71]Ola Salman
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A review on machine learning-based approaches for Internet traffic classification. Ann. des Télécommunications 75(11): 673-710 (2020) - [j70]Reem Melki, Hassan N. Noura
, Ali Chehab
:
Efficient and secure multi-homed systems based on binary random linear network coding. Comput. Electr. Eng. 87: 106774 (2020) - [j69]Sarah Abdallah
, Ayman I. Kayssi
, Imad H. Elhajj
, Ali Chehab
:
Performance analysis of SDN vs OSPF in diverse network environments. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j68]Jean-Paul A. Yaacoub
, Mohamad Noura, Hassan N. Noura
, Ola Salman, Elias Yaacoub, Raphaël Couturier, Ali Chehab
:
Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 105: 581-606 (2020) - [j67]Reem Melki
, Hassan N. Noura
, Ali Chehab
:
Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Sec. 19(6): 679-694 (2020) - [j66]Jean-Paul A. Yaacoub
, Hassan Noura
, Ola Salman, Ali Chehab
:
Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 11: 100218 (2020) - [j65]Hassan Noura
, Tarif Hatoum, Ola Salman, Jean-Paul A. Yaacoub
, Ali Chehab
:
LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet Things 12: 100303 (2020) - [j64]Jean-Paul A. Yaacoub
, Ola Salman, Hassan N. Noura
, Nesrine Kaaniche
, Ali Chehab
, Mohammad Malli:
Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsystems 77: 103201 (2020) - [j63]Raphaël Couturier
, Hassan N. Noura, Ali Chehab
:
ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents. Multim. Tools Appl. 79(19-20): 13559-13579 (2020) - [j62]Hassan Noura, Mohamad Noura, Ola Salman, Raphaël Couturier
, Ali Chehab
:
Efficient & secure image availability and content protection. Multim. Tools Appl. 79(31-32): 22869-22904 (2020) - [j61]Elias Yaacoub, Khalid Abualsaud, Tamer Khattab
, Ali Chehab
:
Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN. IEEE Netw. 34(5): 226-231 (2020) - [j60]Reem Melki
, Hassan N. Noura
, Mohammad M. Mansour, Ali Chehab
:
Physical layer security schemes for MIMO systems: an overview. Wirel. Networks 26(3): 2089-2111 (2020) - [c150]Hassan N. Noura, Ola Salman, Tarif Hatoum, Mohammad Malli, Ali Chehab:
Towards Securing LoRaWAN ABP Communication System. CLOSER 2020: 440-447 - [c149]Basma Hajri, Mohammad M. Mansour, Ali Chehab
, Hassen Aziza:
A Lightweight Reconfigurable RRAM-based PUF for Highly Secure Applications. DFT 2020: 1-4 - [c148]Reem Melki, Hassan Noura, Ali Chehab:
An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems. ICETE (1) 2020: 133-141 - [c147]Hassan N. Noura, Ola Salman, Ali Chehab:
Efficient and Secure Cipher Scheme for Limited IoT Devices. ICETE (1) 2020: 142-150 - [c146]Hussein Majed, Hassan N. Noura, Ola Salman, Mohammad Malli, Ali Chehab:
Efficient and Secure Statistical DDoS Detection Scheme. ICETE (1) 2020: 153-161 - [c145]Hassan Noura
, Ola Salman, Ali Chehab
, Raphaël Couturier:
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. ISCC 2020: 1-7 - [c144]Hussein Majed, Hassan N. Noura
, Ali Chehab
:
Overview of Digital Forensics and Anti-Forensics Techniques. ISDFS 2020: 1-5 - [c143]Hassan N. Noura
, Ali Chehab
, Raphaël Couturier:
Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches. ISDFS 2020: 1-6 - [c142]Mahdi Chehimi
, Elias Yaacoub, Ali Chehab
, Mohammed Al-Husseini
:
Physical Layer Anti-jamming Technique Using Massive Planar Antenna Arrays. IWCMC 2020: 1740-1745 - [c141]Hussein Majed, Hassan N. Noura
, Ola Salman, Ali Chehab
, Raphaël Couturier:
Efficient and Secure Statistical Port Scan Detection Scheme. MSPN 2020: 72-88 - [c140]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Network Obfuscation for Net Worth Security. SDS 2020: 83-88
2010 – 2019
- 2019
- [j59]Basma Hajri
, Hassen Aziza, Mohammad M. Mansour, Ali Chehab
:
RRAM Device Models: A Comparative Analysis With Experimental Validation. IEEE Access 7: 168963-168980 (2019) - [j58]Hassan Noura
, Ola Salman, Ali Chehab
, Raphaël Couturier
:
Preserving data security in distributed fog computing. Ad Hoc Networks 94 (2019) - [j57]Hassan N. Noura
, Reem Melki, Mohammad M. Mansour, Ali Chehab
:
Design and realization of efficient & secure multi-homed systems based on random linear network coding. Comput. Networks 163 (2019) - [j56]Farah Saab, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Modelling Cognitive Bias in Crowdsourcing Systems. Cogn. Syst. Res. 58: 1-18 (2019) - [j55]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. Digit. Commun. Networks 5(4): 245-255 (2019) - [j54]Riwa Mouawi
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. EURASIP J. Inf. Secur. 2019: 11 (2019) - [j53]Elias Yaacoub
, Mohammed Al-Husseini
, Ali Chehab
, Khalid Abualsaud
, Tamer Khattab
, Mohsen Guizani
:
3D Beamforming With Massive Cylindrical Arrays for Physical Layer Secure Data Transmission. IEEE Commun. Lett. 23(5): 830-833 (2019) - [j52]Hassan Noura
, Christophe Guyeux
, Ali Chehab
, Mohammad M. Mansour, Raphaël Couturier
:
Efficient Chaotic Encryption Scheme with OFB Mode. Int. J. Bifurc. Chaos 29(5): 1950059:1-1950059:24 (2019) - [j51]Reem Melki
, Hassan N. Noura
, Mohammad M. Mansour
, Ali Chehab
:
An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach. IEEE Internet Things J. 6(1): 361-378 (2019) - [j50]Hassan N. Noura
, Reem Melki, Ali Chehab
, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. Mob. Networks Appl. 24(2): 447-463 (2019) - [j49]Hassan N. Noura
, Mohamad Noura, Ali Chehab
, Mohammad M. Mansour, Raphaël Couturier
:
Efficient and secure cipher scheme for multimedia contents. Multim. Tools Appl. 78(11): 14837-14866 (2019) - [j48]Hassan Noura, Ali Chehab
, Mohamad Noura, Raphaël Couturier
, Mohammad M. Mansour:
Lightweight, dynamic and efficient image encryption scheme. Multim. Tools Appl. 78(12): 16527-16561 (2019) - [j47]Reem Melki
, Hassan N. Noura
, Mohammad M. Mansour, Ali Chehab
:
A survey on OFDM physical layer security. Phys. Commun. 32: 1-30 (2019) - [j46]Hassan N. Noura, Ali Chehab
, Raphaël Couturier
:
Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Process. Image Commun. 78: 448-464 (2019) - [j45]Elias Yaacoub, Khalid Abualsaud, Tamer Khattab
, Mohsen Guizani, Ali Chehab
:
Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach. IEEE Wirel. Commun. 26(5): 70-76 (2019) - [c139]Mahdi Chehimi
, Rofaida Al Ahmad Matar, Elias Yaacoub, Ali Chehab
, Hassan Noura
:
Massive Planar Antenna Arrays for Physical Layer Security. ACTEA 2019: 1-6 - [c138]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Mobile Traffic Anonymization Through Probabilistic Distribution. ICIN 2019: 242-248 - [c137]Elias Yaacoub, Ali Chehab
, Mohammed Al-Husseini
, Khalid Abualsaud, Tamer Khattab
, Mohsen Guizani:
Joint Security and Energy Efficiency in IoT Networks Through Clustering and Bit Flipping. IWCMC 2019: 1385-1390 - [c136]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. MLN 2019: 99-116 - [c135]Reem Melki, Ali Hussein, Ali Chehab
:
Enhancing Multipath TCP Security Through Software Defined Networking. SDS 2019: 33-38 - [c134]Ali Hussein, Ola Salman, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. SDS 2019: 146-153 - [c133]Reem Melki, Hassan N. Noura
, Ali Chehab
:
Efficient & Secure Physical Layer Cipher Scheme for VLC Systems. VTC Fall 2019: 1-6 - [c132]Reem Melki, Hassan N. Noura
, Ali Chehab
:
Lightweight and Secure D2D Authentication & Key Management Based on PLS. VTC Fall 2019: 1-7 - [c131]Hassan N. Noura
, Reem Melki, Ali Chehab
:
Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems. VTC Fall 2019: 1-7 - [c130]Hassan Noura
, Ali Chehab
:
An Efficient and Secure Variant of RC4 Stream Cipher Scheme for Emerging Networks. WCNC 2019: 1-8 - [c129]Hassan Noura
, Ali Chehab
, Raphaël Couturier:
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices. WCNC 2019: 1-8 - [c128]Hassan Noura
, Raphaël Couturier, Congduc Pham, Ali Chehab
:
Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices. WiMob 2019: 1-8 - [i5]Ahmad W. Bitar, Jean Philippe Ovarlez, Loong-Fah Cheong, Ali Chehab:
Automatic Target Detection for Sparse Hyperspectral Images. CoRR abs/1904.09030 (2019) - 2018
- [j44]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
IoT survey: An SDN and fog computing perspective. Comput. Networks 143: 221-246 (2018) - [j43]Asmaa Abdallah, Mohammad M. Mansour
, Louay M. A. Jalloul, Ali Chehab
:
When Quantized Massive MIMO Meets Large MIMO With Higher Order Modulation. IEEE Commun. Lett. 22(12): 2599-2602 (2018) - [j42]Georgi A. Ajaeiya
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi, Marc Kneppers:
Mobile Apps identification based on network flows. Knowl. Inf. Syst. 55(3): 771-796 (2018) - [j41]Hassen Aziza, Basma Hajri, Mohammad M. Mansour, Ali Chehab
, Annie Pérez:
A lightweight write-assist scheme for reduced RRAM variability and power. Microelectron. Reliab. 88-90: 6-10 (2018) - [j40]Hassan Noura
, Lama Sleem, Mohamad Noura, Mohammad M. Mansour, Ali Chehab
, Raphaël Couturier
:
A new efficient lightweight and secure image cipher scheme. Multim. Tools Appl. 77(12): 15457-15484 (2018) - [j39]Hassan Noura
, Ali Chehab
, Lama Sleem, Mohamad Noura, Raphaël Couturier
, Mohammad M. Mansour:
One round cipher algorithm for multimedia IoT devices. Multim. Tools Appl. 77(14): 18383-18413 (2018) - [j38]Mohamad Noura, Hassan Noura
, Ali Chehab
, Mohammad M. Mansour, Lama Sleem, Raphaël Couturier
:
A dynamic approach for a lightweight and secure cipher for medical images. Multim. Tools Appl. 77(23): 31397-31426 (2018) - [j37]Maha Shamseddine, Wassim Itani
, Ali Chehab
, Ayman I. Kayssi:
Network Programming and Probabilistic Sketching for Securing the Data Plane. Secur. Commun. Networks 2018: 2905730:1-2905730:23 (2018) - [j36]Hadi Sarieddeen
, Mohammad M. Mansour
, Ali Chehab
:
Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis. IEEE Trans. Commun. 66(6): 2421-2436 (2018) - [j35]Asmaa Abdallah
, Mohammad M. Mansour
, Ali Chehab
:
Power Control and Channel Allocation for D2D Underlaid Cellular Networks. IEEE Trans. Commun. 66(7): 3217-3234 (2018) - [j34]Vahe Seferian, Rouwaida Kanj
, Ali Chehab
, Ayman I. Kayssi:
Identity Based Key Distribution Framework for Link Layer Security of AMI Networks. IEEE Trans. Smart Grid 9(4): 3166-3179 (2018) - [j33]Hadi Sarieddeen
, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab
:
High Order Multi-User MIMO Subspace Detection. J. Signal Process. Syst. 90(3): 305-321 (2018) - [c127]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Adaptive Optimization for Hybrid Network Control Planes. AICCSA 2018: 1-8 - [c126]Jean Abou Rahal, Bassel Maamari, Basma Hajri, Rouwaida Kanj, Mohammad M. Mansour, Ali Chehab
:
Low power GDI ALU design with mixed logic adder functionality. ICICDT 2018: 9-12 - [c125]Basma Hajri, Mohammad M. Mansour, Ali Chehab
, Hassen Aziza:
Memristor models optimization for large-scale 1T1R memory arrays. ICICDT 2018: 109-112 - [c124]Riwa Mouawi, Mariette Awad
, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. IIT 2018: 88-92 - [c123]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. INFOCOM Workshops 2018: 27-32 - [c122]Hadi Sarieddeen
, Mohammad M. Mansour, Ali Chehab
:
Channel-Punctured Large MIMO Detection. ISIT 2018: 2147-2151 - [c121]