Year |
Citation |
Score |
2022 |
Liu G, Khreishah A, Sharadgah F, Khalil I. An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef). Ieee Transactions On Neural Networks and Learning Systems. PMID 37015563 DOI: 10.1109/TNNLS.2022.3204283 |
0.495 |
|
2020 |
Shao S, Khreishah A, Khalil I. Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection Ieee Transactions On Mobile Computing. 19: 836-851. DOI: 10.1109/Tmc.2019.2901665 |
0.556 |
|
2020 |
Shao S, Liu G, Khreishah A, Ayyash M, Elgala H, Little TDC, Rahaim M. Optimizing Handover Parameters by Q-Learning for Heterogeneous Radio-Optical Networks Ieee Photonics Journal. 12: 1-15. DOI: 10.1109/Jphot.2019.2953863 |
0.41 |
|
2019 |
Latif A, Kathail P, Vishwarupe S, Dhesikan S, Khreishah A, Jararweh Y. Multicast Optimization for CLOS Fabric in Media Data Centers Ieee Transactions On Network and Service Management. 16: 1855-1868. DOI: 10.1109/Tnsm.2019.2941573 |
0.416 |
|
2019 |
Kiani A, Ansari N, Khreishah A. Hierarchical Capacity Provisioning for Fog Computing Ieee/Acm Transactions On Networking. 27: 962-971. DOI: 10.1109/Tnet.2019.2906638 |
0.519 |
|
2019 |
Al-Fuqaha A, Gharaibeh A, Mohammed I, Hussini SJ, Khreishah A, Khalil I. Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks Ieee Transactions On Intelligent Transportation Systems. 20: 285-296. DOI: 10.1109/Tits.2018.2809917 |
0.63 |
|
2019 |
Rahaim M, Abdalla I, Ayyash M, Elgala H, Khreishah A, Little TDC. Welcome to the CROWD: Design Decisions for Coexisting Radio and Optical Wireless Deployments Ieee Network. 33: 174-182. DOI: 10.1109/Mnet.2019.1800297 |
0.457 |
|
2019 |
Sawalmeh AH, Othman NS, Shakhatreh H, Khreishah A. Wireless Coverage for Mobile Users in Dynamic Environments Using UAV Ieee Access. 7: 126376-126390. DOI: 10.1109/Access.2019.2938272 |
0.405 |
|
2019 |
Shakhatreh H, Sawalmeh AH, Al-Fuqaha A, Dou Z, Almaita E, Khalil I, Othman NS, Khreishah A, Guizani M. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges Ieee Access. 7: 48572-48634. DOI: 10.1109/Access.2019.2909530 |
0.605 |
|
2018 |
Shakhatreh H, Khreishah A, Khalil I. Indoor Mobile Coverage Problem Using UAVs Ieee Systems Journal. 12: 3837-3848. DOI: 10.1109/Jsyst.2018.2824802 |
0.62 |
|
2018 |
Dou Z, Khalil I, Khreishah A. A Novel and Robust Authentication Factor Based on Network Communications Latency Ieee Systems Journal. 12: 3279-3290. DOI: 10.1109/Jsyst.2017.2691550 |
0.65 |
|
2018 |
Dou Z, Khalil I, Khreishah A, Al-Fuqaha A. Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation Ieee Systems Journal. 12: 1874-1885. DOI: 10.1109/Jsyst.2017.2669908 |
0.622 |
|
2018 |
Alsmadi I, Khreishah A, Xu D. Network slicing to improve multicasting in HPC clusters Cluster Computing. 21: 1493-1506. DOI: 10.1007/S10586-017-1561-5 |
0.45 |
|
2017 |
Dou Z, Khalil I, Khreishah A. CLAS: A Novel Communications Latency Based Authentication Scheme Security and Communication Networks. 2017: 1-20. DOI: 10.1155/2017/4286903 |
0.666 |
|
2017 |
Ostovari P, Wu J, Khreishah A. Cooperative Internet Access Using Helper Nodes and Opportunistic Scheduling Ieee Transactions On Vehicular Technology. 66: 6439-6448. DOI: 10.1109/Tvt.2016.2612685 |
0.451 |
|
2017 |
Shao S, Khreishah A, Elgala H. Pixelated VLC-Backscattering for Self-Charging Indoor IoT Devices Ieee Photonics Technology Letters. 29: 177-180. DOI: 10.1109/Lpt.2016.2631946 |
0.371 |
|
2017 |
Guo X, Shao S, Ansari N, Khreishah A. Indoor Localization Using Visible Light Via Fusion of Multiple Classifiers Ieee Photonics Journal. 9: 1-16. DOI: 10.1109/Jphot.2017.2767576 |
0.328 |
|
2017 |
Gharaibeh A, Khreishah A, Mohammadi M, Al-Fuqaha A, Khalil I, Rayes A. Online Auction of Cloud Resources in Support of the Internet of Things Ieee Internet of Things Journal. 4: 1583-1596. DOI: 10.1109/Jiot.2017.2724938 |
0.595 |
|
2017 |
Shakhatreh H, Khreishah A, Alsarhan A, Khalil I, Sawalmeh A, Othman NS. Efficient 3D placement of a UAV using particle swarm optimization Arxiv: Information Theory. 258-263. DOI: 10.1109/Iacs.2017.7921981 |
0.63 |
|
2017 |
Dou Z, Khalil I, Khreishah A, Al-Fuqaha A, Guizani M. Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection Ieee Communications Surveys & Tutorials. 19: 2797-2819. DOI: 10.1109/Comst.2017.2752087 |
0.599 |
|
2017 |
Gharaibeh A, Salahuddin MA, Hussini SJ, Khreishah A, Khalil I, Guizani M, Al-Fuqaha A. Smart Cities: A Survey on Data Management, Security, and Enabling Technologies Ieee Communications Surveys and Tutorials. 19: 2456-2501. DOI: 10.1109/Comst.2017.2736886 |
0.589 |
|
2017 |
Aldalbahi A, Rahaim M, Khreishah A, Ayyash M, Little TDC. Visible Light Communication Module: An Open Source Extension to the ns3 Network Simulator With Real System Validation Ieee Access. 5: 22144-22158. DOI: 10.1109/Access.2017.2759779 |
0.442 |
|
2017 |
Djavid M, Dastjerdi MHT, Philip MR, Choudhary DD, Pham TT, Khreishah A, Nguyen HPT. Photonic crystal-based permutation switch for optical networks Photonic Network Communications. 35: 90-96. DOI: 10.1007/S11107-017-0719-7 |
0.308 |
|
2016 |
Shao S, Khreishah A, Khalil I. Joint link scheduling and brightness control for greening VLC-based indoor access networks Journal of Optical Communications and Networking. 8: 148-161. DOI: 10.1364/Jocn.8.000148 |
0.647 |
|
2016 |
Khalil I, Dou Z, Khreishah A. Your credentials are compromised, do not panic: You can be well protected Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 925-930. DOI: 10.1145/2897845.2897925 |
0.617 |
|
2016 |
Shao S, Khreishah A. Delay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence Ieee Transactions On Wireless Communications. 15: 8406-8421. DOI: 10.1109/Twc.2016.2614822 |
0.348 |
|
2016 |
Gharaibeh A, Khreishah A, Khalil I, Wu J. Distributed Online En-Route Caching Ieee Transactions On Parallel and Distributed Systems. 27: 3455-3468. DOI: 10.1109/Tpds.2016.2547396 |
0.638 |
|
2016 |
Gharaibeh A, Khreishah A, Ji B, Ayyash M. A Provably Efficient Online Collaborative Caching Algorithm for Multicell-Coordinated Systems Ieee Transactions On Mobile Computing. 15: 1863-1876. DOI: 10.1109/Tmc.2015.2474364 |
0.424 |
|
2016 |
Ayyash M, Elgala H, Khreishah A, Jungnickel V, Little T, Shao S, Rahaim M, Schulz D, Hilt J, Freund R. Coexistence of WiFi and LiFi toward 5G: Concepts, opportunities, and challenges Ieee Communications Magazine. 54: 64-71. DOI: 10.1109/Mcom.2016.7402263 |
0.454 |
|
2016 |
Zhang L, Ansari N, Khreishah A. Anycast Planning in Space Division Multiplexing Elastic Optical Networks With Multi-Core Fibers Ieee Communications Letters. 20: 1983-1986. DOI: 10.1109/Lcomm.2016.2593479 |
0.405 |
|
2016 |
Khreishah A, Bany Salameh H, Khalil I, Gharaibeh A. Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks Ieee Systems Journal. DOI: 10.1109/Jsyst.2016.2530695 |
0.621 |
|
2016 |
Khreishah A, Chakareski J, Gharaibeh A. Joint Caching, Routing, and Channel Assignment for Collaborative Small-Cell Cellular Networks Ieee Journal On Selected Areas in Communications. 34: 2275-2284. DOI: 10.1109/Jsac.2016.2577199 |
0.43 |
|
2016 |
Aldalbahi A, Rahaim M, Khreishah A, Ayyash M, Ackerman R, Basuino J, Berreta W, Little TDC. Extending ns3 to simulate visible light communication at network-level 2016 23rd International Conference On Telecommunications, Ict 2016. DOI: 10.1109/ICT.2016.7500485 |
0.354 |
|
2016 |
Khreishah A, Chakareski J, Gharaibeh A, Khalil I, Diabat A. Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization Simulation Modelling Practice and Theory. 64: 83-98. DOI: 10.1016/J.Simpat.2015.09.010 |
0.654 |
|
2016 |
Al-Ayyoub M, Jararweh Y, Doulat A, Bany Salameh HA, Al Abed Al Aziz A, Alsmirat M, Khreishah AA. Virtualization-based Cognitive Radio Networks Journal of Systems and Software. 117: 15-29. DOI: 10.1016/J.Jss.2016.02.014 |
0.401 |
|
2015 |
Shao S, Khreishah A, Ayyash M, Rahaim MB, Elgala H, Jungnickel V, Schulz D, Little TDC, Hilt J, Freund R. Design and analysis of a visible-light-communication enhanced WiFi system Journal of Optical Communications and Networking. 7: 960-973. DOI: 10.1364/Jocn.7.000960 |
0.415 |
|
2015 |
Hababeh I, Khalil I, Khreishah A. Designing high performance web-based computing services to promote telemedicine database management system Ieee Transactions On Services Computing. 8: 47-64. DOI: 10.1109/Tsc.2014.2300499 |
0.59 |
|
2015 |
Khreishah A, Khalil I, Wu J. Universal network coding-based opportunistic routing for unicast Ieee Transactions On Parallel and Distributed Systems. 26: 1765-1774. DOI: 10.1109/Tpds.2014.2322617 |
0.679 |
|
2015 |
Ostovari P, Wu J, Khreishah A, Shroff NB. Scalable Video Streaming With Helper Nodes Using Random Linear Network Coding Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2427161 |
0.63 |
|
2015 |
Ostovari P, Wu J, Khreishah A. Cooperative mobile internet access with opportunistic scheduling Proceedings - 2015 Resilience Week, Rsw 2015. 136-141. DOI: 10.1109/RWEEK.2015.7287432 |
0.324 |
|
2015 |
Al-Fuqaha A, Khreishah A, Guizani M, Rayes A, Mohammadi M. Toward better horizontal integration among IoT services Ieee Communications Magazine. 53: 72-79. DOI: 10.1109/Mcom.2015.7263375 |
0.4 |
|
2015 |
Gharaibeh A, Khreishah A, Khalil I, Wu J. Asymptotically-optimal incentive-based en-route caching scheme Proceedings - 11th Ieee International Conference On Mobile Ad Hoc and Sensor Systems, Mass 2014. 318-326. DOI: 10.1109/MASS.2014.84 |
0.625 |
|
2015 |
Khreishah A, Chakareski J. Collaborative caching for multicell-coordinated systems Proceedings - Ieee Infocom. 2015: 257-262. DOI: 10.1109/INFCOMW.2015.7179394 |
0.437 |
|
2015 |
Khreishah A, Chakareski J, Gharaibeh A, Khalil I, Jararweh Y. Joint data placement and flow control for cost-efficient data center networks 2015 6th International Conference On Information and Communication Systems, Icics 2015. 274-279. DOI: 10.1109/IACS.2015.7103188 |
0.614 |
|
2015 |
Bany Salameh H, Jararweh Y, Khreishah A, Aldalgamouni T. Cooperative weighted-fair control strategy for spectrum self-coexistence in multi-cell WRAN systems Computers and Electrical Engineering. DOI: 10.1016/J.Compeleceng.2015.07.018 |
0.442 |
|
2015 |
Khalil I, Dou Z, Khreishah A. TPM-based authentication mechanism for apache hadoop Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 105-122. DOI: 10.1007/978-3-319-23829-6_8 |
0.586 |
|
2015 |
Ostovari P, Khreishah A, Wu J. Broadcasting with hard deadlines in wireless multihop networks using network coding Wireless Communications and Mobile Computing. 15: 983-999. DOI: 10.1002/wcm.2388 |
0.424 |
|
2014 |
Khalil I, Khreishah A, Azeem M. Cloud Computing Security: A Survey Computers. 3: 1-35. DOI: 10.3390/Computers3010001 |
0.596 |
|
2014 |
Doulat A, Al Abed Al Aziz A, Al-Ayyoub M, Jararweh Y, Bany Salameh HA, Khreishah AA. Software defined framework for multi-cell cognitive radio networks International Conference On Wireless and Mobile Computing, Networking and Communications. 513-518. DOI: 10.1109/WiMOB.2014.6962219 |
0.406 |
|
2014 |
Salameh HB, Jararweh Y, Aldalgamouni T, Khreishah A. Traffic-driven exclusive resource sharing algorithm for mitigating self-coexistence problem in WRAN systems Ieee Wireless Communications and Networking Conference, Wcnc. 1933-1937. DOI: 10.1109/WCNC.2014.6952565 |
0.34 |
|
2014 |
Jararweh Y, Al-Ayyoub M, Doulat A, Al Aziz AAA, Salameh HAB, Khreishah AA. SD-CRN: Software defined cognitive radio network framework Proceedings - 2014 Ieee International Conference On Cloud Engineering, Ic2e 2014. 592-597. DOI: 10.1109/IC2E.2014.88 |
0.346 |
|
2014 |
Khreishah A, Khalil I, Gharaibeh A, Salameh HB, Alasem R. Joint caching and routing for greening computer networks with renewable energy sources Proceedings - 2014 International Conference On Future Internet of Things and Cloud, Ficloud 2014. 101-106. DOI: 10.1109/FiCloud.2014.26 |
0.581 |
|
2014 |
Jararweh Y, Tawalbeh L, Ababneh F, Khreishah A, Dosari F. Scalable cloudlet-based mobile computing model Procedia Computer Science. 34: 434-441. DOI: 10.1016/J.Procs.2014.07.051 |
0.398 |
|
2014 |
Ostovari P, Wu J, Khreishah A. Symbol-level reliable broadcasting of sensitive data in error-prone wireless networks Journal of Parallel and Distributed Computing. 74: 2673-2685. DOI: 10.1016/J.Jpdc.2014.02.004 |
0.493 |
|
2014 |
Khalil I, Khreishah A, Azeem M. Consolidated Identity Management System for secure mobile cloud computing Computer Networks. 65: 99-110. DOI: 10.1016/J.Comnet.2014.03.015 |
0.626 |
|
2014 |
Khalil IM, Khreishah A, Ahmed F, Shuaib K. Dependable wireless sensor networks for reliable and secure humanitarian relief applications Ad Hoc Networks. 13: 94-106. DOI: 10.1016/j.adhoc.2012.06.002 |
0.639 |
|
2014 |
Ostovari P, Khreishah A, Wu J, Yang WS. Trade-off between Redundancy and Feedback in Wireless Network Communication Ad-Hoc and Sensor Wireless Networks. 24: 21-47. |
0.391 |
|
2013 |
Hababeh I, Khalil I, Khreishah A, Bataineh S. Performance evaluation of wormhole security approaches for ad-hoc networks Journal of Computer Science. 9: 1626-1637. DOI: 10.3844/Jcssp.2013.1626.1637 |
0.658 |
|
2013 |
Ostovari P, Khreishah A, Wu J. Cache content placement using triangular network coding Ieee Wireless Communications and Networking Conference, Wcnc. 1375-1380. DOI: 10.1109/WCNC.2013.6554764 |
0.408 |
|
2013 |
Khreishah A, Khalil I, Wu J. Low complexity and provably efficient algorithm for joint inter and intrasession network coding in wireless networks Ieee Transactions On Parallel and Distributed Systems. 24: 2015-2024. DOI: 10.1109/Tpds.2012.215 |
0.679 |
|
2013 |
Al-Hami M, Khreishah A, Wu J. Video streaming over wireless LAN with network coding Proceedings - Ieee 12th International Symposium On Network Computing and Applications, Nca 2013. 173-176. DOI: 10.1109/NCA.2013.31 |
0.375 |
|
2013 |
Ostovari P, Khreishah A, Wu J. Multi-layer video streaming with helper nodes using network coding Proceedings - Ieee 10th International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2013. 524-532. DOI: 10.1109/MASS.2013.67 |
0.349 |
|
2013 |
Khalil IM, Khreishah A, Bouktif S, Ahmad A. Security concerns in cloud computing Proceedings of the 2013 10th International Conference On Information Technology: New Generations, Itng 2013. 411-416. DOI: 10.1109/ITNG.2013.127 |
0.551 |
|
2013 |
Khalil I, Bataineh S, Qubajah L, Khreishah A. Distributed secure routing protocol for Mobile Ad-Hoc Networks 2013 5th International Conference On Computer Science and Information Technology, Csit 2013 - Proceedings. 106-110. DOI: 10.1109/CSIT.2013.6588766 |
0.632 |
|
2012 |
Khalil IM, Gadallah Y, Hayajneh M, Khreishah A. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks. Sensors (Basel, Switzerland). 12: 8782-805. PMID 23012517 DOI: 10.3390/S120708782 |
0.634 |
|
2012 |
Khreishah A, Khalil IM, Wu J. Distributed network coding-based opportunistic routing for multicast Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 115-124. DOI: 10.1145/2248371.2248390 |
0.639 |
|
2012 |
Khreishah A, Khalil IM, Ostovari P, Wu J. Flow-based XOR network coding for lossy wireless networks Ieee Transactions On Wireless Communications. 11: 2321-2329. DOI: 10.1109/TWC.2012.041912.112105 |
0.411 |
|
2012 |
Khreishah A, Khalil IM, Wu J. Universal opportunistic routing scheme using network coding Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks Workshops. 1: 353-361. DOI: 10.1109/SECON.2012.6275797 |
0.653 |
|
2012 |
Khalil IM, Khreishah A. On the analysis of identity delegation attacks 2012 International Conference On Computing, Networking and Communications, Icnc'12. 990-994. DOI: 10.1109/ICCNC.2012.6167574 |
0.605 |
|
2012 |
Ostovari P, Wu J, Khreishah A. Deadline-aware broadcasting in wireless networks with local network coding 2012 International Conference On Computing, Networking and Communications, Icnc'12. 1123-1127. DOI: 10.1109/ICCNC.2012.6167383 |
0.418 |
|
2012 |
Ostovari P, Khreishah A, Wu J. Deadline-aware broadcasting in wireless networks with network coding Globecom - Ieee Global Telecommunications Conference. 4435-4440. DOI: 10.1109/GLOCOM.2012.6503816 |
0.406 |
|
2012 |
Shi JY, Taifi M, Khreishah A, Wu J. Tuple switching network - When slower may be better Journal of Parallel and Distributed Computing. 72: 1521-1534. DOI: 10.1016/J.Jpdc.2012.01.014 |
0.446 |
|
2012 |
Khalil I, Awad M, Khreishah A. CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks Computer Networks. 56: 3300-3317. DOI: 10.1016/J.Comnet.2012.06.003 |
0.666 |
|
2011 |
Khreishah A, Wu J, Ostovari P, Khalil IM. Flow based XOR network coding for lossy wireless networks Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/Twc.2012.041912.112105 |
0.666 |
|
2011 |
Khreishah A, Khalil IM, Wu J. Polynomial time and provably efficient network coding scheme for lossy wireless networks Proceedings - 8th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2011. 391-400. DOI: 10.1109/MASS.2011.46 |
0.638 |
|
2010 |
Khreishah A, Wang CC, Shroff NB. Rate control with pairwise intersession network coding Ieee/Acm Transactions On Networking. 18: 816-829. DOI: 10.1109/Tnet.2009.2032353 |
0.626 |
|
2009 |
Khreishah A, Wang CC, Shroff NB. Cross-layer optimization for wireless multihop networks with pairwise intersession network coding Ieee Journal On Selected Areas in Communications. 27: 606-621. DOI: 10.1109/Jsac.2009.090604 |
0.617 |
|
2009 |
Wang CC, Khreishah A, Shroff NB. Cross-layer optimizations for intersession network coding on practical 2-hop relay networks Conference Record - Asilomar Conference On Signals, Systems and Computers. 771-775. DOI: 10.1109/ACSSC.2009.5469961 |
0.561 |
|
2008 |
Khreishah A, Wang CC, Shroff NB. Optimization based rate control for communication networks with inter-session network coding Proceedings - Ieee Infocom. 520-528. DOI: 10.1109/INFOCOM.2007.25 |
0.602 |
|
2007 |
Khreishah A, Wang CC, Shroff NB. Capacity regions for multiple unicast flows using inter-session network coding Wicon 2007 - 3rd International Icst Conference On Wireless Internet. DOI: 10.4108/wicon.2007.2287 |
0.574 |
|
Show low-probability matches. |