Khair Al Shamaileh

Orcid: 0000-0003-4112-2605

According to our database1, Khair Al Shamaileh authored at least 18 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Classification and Source Location Indication of Jamming Attacks Targeting UAVs via Multi-output Multiclass Machine Learning Modeling.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification.
Comput. Secur., March, 2023

A Machine Learning Approach for the Detection of Injection Attacks on ADS-B Messaging Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

A Real-time Machine Learning-based GPS Spoofing Solution for Location-dependent UAV Applications.
Proceedings of the IEEE International Conference on Electro Information Technology, 2023

Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Electro Information Technology, 2023

2022
Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-Tailored Machine Learning.
IEEE Access, 2022

ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

2021
A High-Frequency/Power Ratio Wilkinson Power Divider Based on Identical/Non-Identical Multi-T-Sections With Short-Circuited Stubs.
IEEE Open J. Circuits Syst., 2021

A Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems Using Timestamping and XOR Logic.
IEEE Consumer Electron. Mag., 2021

A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

2020
Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers.
IEEE Trans. Veh. Technol., 2020

Substrate Integrated Waveguide Bandpass Filtering With Fourier-Varying Via-Hole Walling.
IEEE Access, 2020

A Machine Learning Based Smartphone App for GPS Spoofing Detection.
Proceedings of the Security and Privacy in Communication Networks, 2020

Timestamp-based Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

2018
An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise.
IEEE Access, 2018

2013
Fourier-based transmission line ultra-wideband Wilkinson power divider for EARS applications.
Proceedings of the IEEE 56th International Midwest Symposium on Circuits and Systems, 2013


  Loading...