Basel Alomair

Orcid: 0000-0002-0494-2586

According to our database1, Basel Alomair authored at least 51 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vulnerability Detection with Code Language Models: How Far Are We?
CoRR, 2024

2023
Jatmo: Prompt Injection Defense by Task-Specific Finetuning.
CoRR, 2023

2019
On the Structure and Computation of Random Walk Times in Finite Graphs.
IEEE Trans. Autom. Control., 2019

2018
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach.
IEEE Trans. Control. Netw. Syst., 2018

Combinatorial Algorithms for Control of Biological Regulatory Networks.
IEEE Trans. Control. Netw. Syst., 2018

2017
Secret Key Agreement: Fundamental Limits and Practical Challenges.
IEEE Wirel. Commun., 2017

Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Autom. Control., 2017

Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control. Optim., 2017

Secrecy Capacity Analysis Over α-μ Fading Channels.
IEEE Commun. Lett., 2017

On Secure NOMA Systems With Transmit Antenna Selection Schemes.
IEEE Access, 2017

2016
The Diversity-Multiplexing Tradeoff of Secret-Key Agreement Over Multiple Antenna Channels.
IEEE Trans. Wirel. Commun., 2016

Achievable Rates of Secure Transmission in Gaussian MISO Channel With Imperfect Main Channel Estimation.
IEEE Trans. Wirel. Commun., 2016

On the Ergodic Secret-Key Agreement Over Spatially Correlated Multiple-Antenna Channels With Public Discussion.
IEEE Trans. Signal Process., 2016

Authenticated encryption: how reordering can impact performance.
Secur. Commun. Networks, 2016

Secret-Key Agreement With Public Discussion Subject to an Amplitude Constraint.
IEEE Commun. Lett., 2016

Secure Error-Tolerant Graph Matching Protocols.
IACR Cryptol. ePrint Arch., 2016

Submodularity in Input Node Selection for Networked Systems.
CoRR, 2016

The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

The MISO wiretap channel with channel uncertainty: Asymptotic perspectives.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Scalable and distributed submodular maximization with matroid constraints.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A host takeover game model for competing malware.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Input selection for disturbance rejection in networked cyber-physical systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Jamming-based adversarial control of network flow allocation: A passivity approach.
Proceedings of the American Control Conference, 2015

2014
Efficient Authentication for Mobile and Pervasive Computing.
IEEE Trans. Mob. Comput., 2014

E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels.
IEEE Trans. Computers, 2014

Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Autom. Control., 2014

Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014

Distributed online submodular maximization in resource-constrained networks.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

Graph-based verification and misbehavior detection in multi-agent networks.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation.
Proceedings of the IEEE Global Communications Conference, 2014

Universal Hash-Function Families: From Hashing to Authentication.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Optimized relay-route assignment for anonymity in wireless networks.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distributed Syst., 2012

Optimized flow allocation for anonymous communication in multipath wireless networks.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Leader selection in multi-agent systems for smooth convergence via fast mixing.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Multipath flow allocation in anonymous wireless networks with dependent sources.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Securing low-cost RFID systems: An unconditionally secure approach.
J. Comput. Secur., 2011

2010
The power of primes: security of authentication based on a universal hash-function family.
J. Math. Cryptol., 2010

Privacy versus scalability in radio frequency identification systems.
Comput. Commun., 2010

$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Statistical Framework for Source Anonymity in Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Information Theoretically Secure Encryption with Almost Free Authentication.
J. Univers. Comput. Sci., 2009

Unconditionally Secure Authenticated Encryption with Shorter Keys.
Proceedings of the Security in Information Systems, 2009

2008
On the Authentication of RFID Systems with Bitwise Operations.
Proceedings of the NTMS 2008, 2008

Efficient Generic Forward-Secure Signatures and Proxy Signatures.
Proceedings of the Public Key Infrastructure, 2008

2007
Passive Attacks on a Class of Authentication Protocols for RFID.
Proceedings of the Information Security and Cryptology, 2007


  Loading...