Ibrahim Khalil

According to our database1, Ibrahim Khalil authored at least 166 papers between 1998 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code.
IEEE J. Biomed. Health Informatics, 2021

Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems.
IEEE Netw., 2021

Towards secure and practical consensus for blockchain based VANET.
Inf. Sci., 2021

2020
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud.
IEEE Trans. Parallel Distributed Syst., 2020

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2020

Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption.
J. Parallel Distributed Comput., 2020

Lightweight privacy preservation for secondary users in cognitive radio networks.
J. Netw. Comput. Appl., 2020

Efficient privacy preservation of big data for accurate data mining.
Inf. Sci., 2020

Local Differential Privacy for Deep Learning.
IEEE Internet Things J., 2020

Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption.
Eng. Appl. Artif. Intell., 2020

PPaaS: Privacy Preservation as a Service.
CoRR, 2020

Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?
CoRR, 2020

Privacy Preserving Distributed Machine Learning with Federated Learning.
CoRR, 2020

Privacy Preserving Face Recognition Utilizing Differential Privacy.
Comput. Secur., 2020

An intelligent healthcare system with data priority based on multi vital biosignals.
Comput. Methods Programs Biomed., 2020

Patient clustering using dynamic partitioning on correlated and uncertain biomedical data.
Comput. Methods Programs Biomed., 2020

Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain.
Proceedings of the Security and Privacy in Communication Networks, 2020

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

BACC: Blockchain-Based Access Control For Cloud Data.
Proceedings of the Australasian Computer Science Week, 2020

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019

Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Knowl. Based Syst., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
J. Parallel Distributed Comput., 2019

Privacy-preserving aggregation for cooperative spectrum sensing.
J. Netw. Comput. Appl., 2019

A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Int. J. Inf. Manag., 2019

IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography.
CoRR, 2019

Local Differential Privacy for Deep Learning.
CoRR, 2019

A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019

An efficient and scalable privacy preserving algorithm for big data and data streams.
Comput. Secur., 2019

Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare.
Comput. Networks, 2019

Real-time Secure Health Surveillance for Smarter Health Communities.
IEEE Commun. Mag., 2019

Secure Edge of Things for Smart Healthcare Surveillance Framework.
IEEE Access, 2019

ADS4all: Democratizing Authenticated Data Structures.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019

A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Gaussian Approximation-Based Lossless Compression of Smart Meter Readings.
IEEE Trans. Smart Grid, 2018

Efficient data perturbation for privacy preserving and accurate data stream mining.
Pervasive Mob. Comput., 2018

Fast and peer-to-peer vital signal learning system for cloud-based healthcare.
Future Gener. Comput. Syst., 2018

Determining Anxiety in Obsessive Compulsive Disorder through Behavioural Clustering and Variations in Repetition Intensity.
Comput. Methods Programs Biomed., 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
IEEE Access, 2018

An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

GazeRevealer: Inferring Password Using Smartphone Front Camera.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2017
Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management.
IEEE Trans. Cloud Comput., 2017

BDCaM: Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare.
IEEE Trans. Cloud Comput., 2017

Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
IEEE Trans. Biomed. Eng., 2017

PEACE-Home: Probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring.
Pervasive Mob. Comput., 2017

Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
J. Comput. Syst. Sci., 2017

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
IET Wirel. Sens. Syst., 2017

Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography.
Future Gener. Comput. Syst., 2017

ViSiBiD: A learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data.
Comput. Networks, 2017

A clinical decision-making mechanism for context-aware and patient-specific remote monitoring systems using the correlations of multiple vital signs.
Comput. Methods Programs Biomed., 2017

Reliable delay-sensitive spectrum handoff management for re-entrant secondary users.
Ad Hoc Networks, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Private Recommendations Generation for Vertically Partitioned Datasets.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Privacy Preserving User-Based Recommender System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2016

<i>k</i>NNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering.
IEEE Trans. Knowl. Data Eng., 2016

A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission.
IEEE J. Biomed. Health Informatics, 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

A Practical Privacy-Preserving Recommender System.
Data Sci. Eng., 2016

Hybrid Cryptographic Access Control for Cloud-Based EHR Systems.
IEEE Cloud Comput., 2016

Secure Data Analytics for Cloud-Integrated Internet of Things Applications.
IEEE Cloud Comput., 2016

Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid.
Ad Hoc Networks, 2016

Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
Ad Hoc Networks, 2016

A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Securing Body Sensor Network with ECG.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Data Summarization Techniques for Big Data - A Survey.
Proceedings of the Handbook on Data Centers, 2015

Enhancing Availability in Content Delivery Networks for Mobile Platforms.
IEEE Trans. Parallel Distributed Syst., 2015

Cooperative Web Caching Using Dynamic Interest-Tagged Filtered Bloom Filters.
IEEE Trans. Parallel Distributed Syst., 2015

By-Passing Infected Areas in Wireless Sensor Networks Using BPR.
IEEE Trans. Computers, 2015

Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria.
IEEE Trans. Computers, 2015

A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living.
Pattern Recognit., 2015

Secure and reliable surveillance over cognitive radio sensor networks in smart grid.
Pervasive Mob. Comput., 2015

Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
Pervasive Mob. Comput., 2015

Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
Inf. Syst., 2015

Multi-objective optimisation for selective packet discarding in wireless sensor network.
IET Wirel. Sens. Syst., 2015

Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications.
Comput. Networks, 2015

Multi-Binomial mixes: A proposal for secure and efficient anonymous communication.
Comput. Networks, 2015

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
IEEE Cloud Comput., 2015

2014
ECG Biometric with Abnormal Cardiac Conditions in Remote Monitoring System.
IEEE Trans. Syst. Man Cybern. Syst., 2014

A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis.
IEEE Trans. Emerg. Top. Comput., 2014

Data mining in mobile ECG based biometric identification.
J. Netw. Comput. Appl., 2014

Garbled Routing (GR): A generic framework towards unification of anonymous communication systems.
J. Netw. Comput. Appl., 2014

Data summarization for network traffic monitoring.
J. Netw. Comput. Appl., 2014

PileCast: Multiple bit rate live video streaming over BitTorrent.
J. Netw. Comput. Appl., 2014

An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content.
J. Netw. Comput. Appl., 2014

Accurate positioning using long range active RFID technology to assist visually impaired people.
J. Netw. Comput. Appl., 2014

A distributed aggregation and fast fractal clustering approach for SOAP traffic.
J. Netw. Comput. Appl., 2014

Cloud enabled fractal based ECG compression in wireless body sensor networks.
Future Gener. Comput. Syst., 2014

CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living.
Future Gener. Comput. Syst., 2014

An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion.
Future Gener. Comput. Syst., 2014

PPFSCADA: Privacy preserving framework for SCADA data publishing.
Future Gener. Comput. Syst., 2014

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems.
Comput. Secur., 2014

Load-sensitive dynamic workflow re-orchestration and optimisation for faster patient healthcare.
Comput. Methods Programs Biomed., 2014

Securing Big Data Applications in the Cloud [Guest editors' introduction].
IEEE Cloud Comput., 2014

Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems.
Proceedings of the 13th IEEE International Conference on Trust, 2014

CluClas: Hybrid clustering-classification approach for accurate and efficient network classification.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

2013
Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.
IEEE Trans. Biomed. Eng., 2013

Automatic and Autonomous Load Management in Peer-to-Peer Virtual Environments.
IEEE J. Sel. Areas Commun., 2013

Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling.
J. Parallel Distributed Comput., 2013

Fractal self-similarity measurements based clustering technique for SOAP Web messages.
J. Parallel Distributed Comput., 2013

Toward an efficient and scalable feature selection approach for internet traffic classification.
Comput. Networks, 2013

Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.
Comput. Methods Programs Biomed., 2013

Garbled Routing (GR): Towards Unification of Anonymous Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Turbo-coded HARQ scheme in multi-hop cooperative wireless networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

SCADAVT-A framework for SCADA security testbed based on virtualization technology.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Preference based load balancing as an outpatient appointment scheduling aid.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Steganography-based access control to medical data hidden in electrocardiogram.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Protection of electronic health records (EHRs) in cloud.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Context-aware Cardiac Monitoring for Early Detection of Heart Diseases.
Proceedings of the Computing in Cardiology, 2013

2012
Redundancy-aware SOAP messages compression and aggregation for enhanced performance.
J. Netw. Comput. Appl., 2012

Fully peer-to-peer virtual environments with 3D Voronoi diagrams.
Computing, 2012

Safe trajectory estimation at a pedestrian crossing to assist visually impaired people.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

2011
Diagnosis of Cardiovascular Abnormalities From Compressed ECG: A Data Mining-Based Approach.
IEEE Trans. Inf. Technol. Biomed., 2011

Cardioids-based faster authentication and diagnosis of remote cardiovascular patients.
Secur. Commun. Networks, 2011

A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Secur. Commun. Networks, 2011

An embedded DSP hardware encryption module for secure e-commerce transactions.
Secur. Commun. Networks, 2011

Faster person identification using compressed ECG in time critical wireless telecardiology applications.
J. Netw. Comput. Appl., 2011

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Netw. Comput. Appl., 2011

Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
J. Medical Syst., 2011

A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
Expert Syst. Appl., 2011

Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Clustering SOAP Web Services on Internet Computing Using Fast Fractals.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Person identification in irregular cardiac conditions using electrocardiogram signals.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Real-time wearable telecardiology from representative signals.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

ECG biometric using multilayer perceptron and radial basis function neural networks.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Dynamic Fractal Clustering Technique for SOAP Web Messages.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
ECG-Based Authentication.
Proceedings of the Handbook of Information and Communication Security, 2010

Intranet Security via Firewalls.
Proceedings of the Handbook of Information and Communication Security, 2010

Polynomial distance measurement for ECG based biometric authentication.
Secur. Commun. Networks, 2010

Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

SOAP Web Services Compression Using Variable and Fixed Length Coding.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams.
Proceedings of the 2010 International Conference on High Performance Computing, 2010

2009
Novel methods of faster cardiovascular diagnosis in wireless telecardiology.
IEEE J. Sel. Areas Commun., 2009

A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking.
J. Medical Syst., 2009

Cooperative Remote Video Consultation on Demand for e-Patients.
J. Medical Syst., 2009

2008
Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism.
Secur. Commun. Networks, 2008

A novel wavelet packet-based anti-spoofing technique to secure ECG data.
Int. J. Biom., 2008

QoS-aware Application Layer Multicast.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
An Architecture for Distributed Content Delivery Network.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Efficient Proxy Selection in Cooperative Web Caching.
Proceedings of the 15th IEEE International Conference on Networks, 2007

An End-Systems Supported Highly Distributed Content Delivery Network.
Proceedings of the Distributed Computing and Internet Technology, 2007

2006
Making Application Layer Multicast Reliableis Feasible.
Proceedings of the LCN 2006, 2006

An Adaptive Membership Algorithm for Application Layer Multicast.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Reliability Enhanced Large-Scale Application Layer Multicast.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Load Sharing in Peer-to-Peer Networks using Dynamic Replication.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Probabilistic QoS Routing inWiFi P2P Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Gossip-based Membership Management Algorithm for Large-Scale Peer-to-Peer Media Streaming.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

2004
A Scalable and Roboust QoS Architecture for WiFi P2P Networks.
Proceedings of the Distributed Computing and Internet Technology, 2004

2002
Edge Provisioning and Fairness in VPN-DiffServ Networks.
J. Netw. Syst. Manag., 2002

Automated service provisioning in heterogeneous large-scale environment.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains.
Proceedings of the Management of Multimedia on the Internet, 2001

A Range-Based SLA and Edge Driven Virtual Core Provisioning in DiffServ-VPNs.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

2000
Implementation of a Bandwidth Broker for Dynamic End-to-End Resource Reservation in Outsourced Virtual Private Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1999
An Architecture for Managing QoS-Enabled VPNs over the Internet.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

1998
Differentiated Internet Services.
Proceedings of the Workshop on Wide Area Networks and High Performance Computing, 1998


  Loading...