Issa Khalil

Follow

Generating author description...

All published works
Action Title Year Authors
+ PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs) 2024 Mahmoud Nazzal
Issa Khalil
Abdallah Khreishah
NhatHai Phan
+ Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code 2024 Khiem Ton
Nhi Nguyen
Mahmoud Nazzal
Abdallah Khreishah
Cristian Borcea
NhatHai Phan
Ruoming Jin
Issa Khalil
Yelong Shen
+ PDF Chat Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions 2024 Naseem Ahmad Khan
Kashif Ahmad
A. Tamimi
Mohammed M. Alani
Amine Bermak
Issa Khalil
+ PDF Chat A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs 2024 Euijin Choo
Mohamed Nabeel
Doowon Kim
Ravindu De Silva
Ting Yu
Issa Khalil
+ PDF Chat A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs 2024 Euijin Choo
Mohamed Nabeel
Doowon Kim
Ravindu De Silva
Ting Yu
Issa Khalil
+ A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs 2023 Euijin Choo
Mohamed Nabeel
Doowon Kim
Ravindu De Silva
Ting Yu
Issa Khalil
+ FairDP: Certified Fairness with Differential Privacy 2023 Khang Tran
Ferdinando Fioretto
Issa Khalil
My T. Thai
NhatHai Phan
+ Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection 2023 Mahmoud Nazzal
Issa Khalil
Abdallah Khreishah
NhatHai Phan
Ma Yao
+ PDF Chat Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks 2022 Khang Tran
Phung Lai
NhatHai Phan
Issa Khalil
Yao Ma
Abdallah Khreishah
My T. Thai
Xintao Wu
+ PDF Chat An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef) 2022 Guanxiong Liu
Abdallah Khreishah
Fatima Sharadgah
Issa Khalil
+ How to Backdoor HyperNetwork in Personalized Federated Learning? 2022 Phung Lai
NhatHai Phan
Abdallah Khreishah
Issa Khalil
Xintao Wu
+ A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs 2022 Euijin Choo
Mohamed Nabeel
Ravindu De Silva
Ting Yu
Issa Khalil
+ An Adaptive Black-box Defense against Trojan Attacks (TrojDef) 2022 Guanxiong Liu
Abdallah Khreishah
Fatima Sharadgah
Issa Khalil
+ Ten Years after ImageNet: A 360° Perspective on AI 2022 Sanjay Chawla
Preslav Nakov
Ahmed Ali
Wendy Hall
Issa Khalil
Xiaosong Ma
Hüsrev Taha Sencar
Ingmar Weber
Michael Wooldridge
Ting Yu
+ Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks 2022 Khang Tran
Phung Lai
NhatHai Phan
Issa Khalil
Yao Ma
Abdallah Khreishah
My T. Thai
Xintao Wu
+ Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior 2022 Enes Altınışık
Hüsrev Taha Sencar
Mohamed Nabeel
Issa Khalil
Ting Yu
+ PDF Chat A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples 2021 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
NhatHai Phan
+ PDF Chat Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems 2021 Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
+ PDF Chat Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples 2021 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples 2021 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
NhatHai Phan
+ Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems 2020 Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
+ BASCPS: How does behavioral decision making impact the security of cyber-physical systems? 2020 Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
+ Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples 2020 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples 2020 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
Abdulelah Algosaibi
Adel Aldalbahi
Mohammed Alaneem
Abdulaziz Alhumam
Mohammed Anan
+ PDF Chat ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples 2020 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
Abdulelah Algosaibi
Adel Aldalbahi
Mohammed Al-Naeem
Abdulaziz Alhumam
Muhammad Anan
+ Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users 2020 Lun-Pin Yuan
Euijin Choo
Ting Yu
Issa Khalil
Sencun Zhu
+ Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems 2020 Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
+ BASCPS: How does behavioral decision making impact the security of cyber-physical systems? 2020 Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
+ PDF Chat ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ PDF Chat Using Intuition from Empirical Properties to Simplify Adversarial Training Defense 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ PDF Chat GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ Using Intuition from Empirical Properties to Simplify Adversarial Training Defense 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
+ DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference 2019 Euijin Choo
Mohamed Nabeel
Mashael AlSabah
Issa Khalil
Ting Yu
Wei Wang
+ PDF Chat Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges 2019 Hazim Shakhatreh
Ahmad Sawalmeh
Ala Al‐Fuqaha
Zuochao Dou
Eyad Almaita
Issa Khalil
Noor Shamsiah Othman
Abdallah Khreishah
Mohsen Guizani
+ PDF Chat A Survey on Malicious Domains Detection through DNS Data Analysis 2018 Yury Zhauniarovich
Issa Khalil
Ting Yu
Marc Daciér
+ PDF Chat Indoor Mobile Coverage Problem Using UAVs 2018 Hazim Shakhatreh
Abdallah Khreishah
Issa Khalil
+ PDF Chat Efficient 3D placement of a UAV using particle swarm optimization 2017 Hazim Shakhatreh
Abdallah Khreishah
Ayoub Alsarhan
Issa Khalil
Ahmad Sawalmeh
Noor Shamsiah Othman
+ Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage 2017 Issa Khalil
Bei Guan
Mohamed Nabeel
Ting Yu
+ PDF Chat On the continuous coverage problem for a swarm of UAVs 2016 Hazim Shakhatreh
Abdallah Khreishah
Jacob Chakareski
Haythem Bany Salameh
Issa Khalil
+ PDF Chat Joint Link Scheduling and Brightness Control for Greening VLC-Based Indoor Access Networks 2016 Sihua Shao
Abdallah Khreishah
Issa Khalil
+ Joint Link Scheduling and Brightness Control for Greening VLC-based Indoor Access Networks 2015 Sihua Shao
Abdallah Khreishah
Issa Khalil
+ PDF Chat Asymptotically-Optimal Incentive-Based En-Route Caching Scheme 2014 Ammar Gharaibeh
Abdallah Khreishah
Issa Khalil
Jie Wu
+ Asymptotically-Optimal Incentive-Based En-Route Caching Scheme 2014 Ammar Gharaibeh
Abdallah Khreishah
Issa Khalil
Jie Wu
+ Towards a client-side QoS monitoring and assessment using Generalized Pareto Distribution in a cloud-based environment 2013 Ammar Kamel
Ala Al‐Fuqaha
Dionysios Kountanis
Issa Khalil
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Towards Evaluating the Robustness of Neural Networks 2017 Nicholas Carlini
David Wagner
10
+ PDF Chat Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks 2016 Nicolas Papernot
Patrick McDaniel
Xi Wu
Somesh Jha
Ananthram Swami
9
+ Adversarial Machine Learning at Scale 2016 Alexey Kurakin
Ian Goodfellow
Samy Bengio
9
+ Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples 2018 Anish Athalye
Nicholas Carlini
David Wagner
8
+ Towards Deep Learning Models Resistant to Adversarial Attacks. 2018 Aleksander Mądry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
7
+ Adversarial Logit Pairing 2018 Harini Kannan
Alexey Kurakin
Ian Goodfellow
6
+ PDF Chat Deep Residual Learning for Image Recognition 2016 Kaiming He
Xiangyu Zhang
Shaoqing Ren
Jian Sun
5
+ Striving for Simplicity: The All Convolutional Net 2014 Jost Tobias Springenberg
Alexey Dosovitskiy
Thomas Brox
Martin Riedmiller
5
+ Ensemble Adversarial Training: Attacks and Defenses 2017 Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
5
+ Technical Report on the CleverHans v2.1.0 Adversarial Examples Library 2016 Nicolas Papernot
Fartash Faghri
Nicholas Carlini
Ian Goodfellow
Reuben Feinman
Alexey Kurakin
Cihang Xie
Yash Sharma
T. B. Brown
Aurko Roy
5
+ Explaining and Harnessing Adversarial Examples 2014 Ian Goodfellow
Jonathon Shlens
Christian Szegedy
5
+ Drone Small Cells in the Clouds: Design, Deployment and Performance Analysis 2015 Mohammad Mozaffari
Walid Saad
Mehdi Bennis
Mérouane Debbah
4
+ PDF Chat Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction 2018 Bin Liang
Hongcheng Li
Miaoqiang Su
Xirong Li
Wenchang Shi
Xiaofeng Wang
4
+ Adam: A Method for Stochastic Optimization 2014 Diederik P. Kingma
Jimmy Ba
4
+ PDF Chat Optimal transport theory for power-efficient deployment of unmanned aerial vehicles 2016 Mohammad Mozaffari
Walid Saad
Mehdi Bennis
Mérouane Debbah
4
+ Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models 2018 Pouya Samangouei
Maya Kabkab
Rama Chellappa
3
+ PDF Chat Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data 2015 Alina Oprea
Zhou Li
Ting-Fang Yen
Sang Chin
Sumayah Alrwais
3
+ Adversarial examples in the physical world 2016 Alexey Kurakin
Ian Goodfellow
Samy Bengio
3
+ PDF Chat Drone Small Cells in the Clouds: Design, Deployment and Performance Analysis 2014 Mohammad Mozaffari
Walid Saad
Mehdi Bennis
Mérouane Debbah
3
+ Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks 2018 Weilin Xu
David Evans
Yanjun Qi
3
+ PDF Chat Providing wireless coverage to high-rise buildings using UAVs 2017 Hazim Shakhatreh
Abdallah Khreishah
Bo Ji
3
+ Efficient Deployment of Multiple Unmanned Aerial Vehicles for Optimal Wireless Coverage 2016 Mohammad Mozaffari
Walid Saad
Mehdi Bennis
Mérouane Debbah
3
+ Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples 2018 Anish Athalye
Nicholas Carlini
David T. Wagner
3
+ Towards Deep Learning Models Resistant to Adversarial Attacks 2017 Aleksander Mądry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
3
+ Manifold Mixup: Encouraging Meaningful On-Manifold Interpolation as a Regularizer. 2018 Vikas Verma
Alex Lamb
Christopher Beckham
Aaron Courville
Ioannis Mitliagkas
Yoshua Bengio
3
+ PDF Chat Interdependent Security Games on Networks Under Behavioral Probability Weighting 2016 Ashish R. Hota
Shreyas Sundaram
3
+ MagNet: a Two-Pronged Defense against Adversarial Examples 2017 Dongyu Meng
Hao Chen
3
+ Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations 2018 Alex Lamb
Jonathan Binas
Anirudh Goyal
Dmitriy Serdyuk
Sandeep Subramanian
Ioannis Mitliagkas
Yoshua Bengio
3
+ PDF Chat ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks 2019 Guanxiong Liu
Issa Khalil
Abdallah Khreishah
3
+ PDF Chat On the continuous coverage problem for a swarm of UAVs 2016 Hazim Shakhatreh
Abdallah Khreishah
Jacob Chakareski
Haythem Bany Salameh
Issa Khalil
3
+ Controllable Invariance through Adversarial Feature Learning 2017 Qizhe Xie
Zihang Dai
Yulun Du
Eduard Hovy
Graham Neubig
3
+ Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models. 2018 Pouya Samangouei
Maya Kabkab
Rama Chellappa
3
+ PDF Chat Efficient 3-D placement of an aerial base station in next generation cellular networks 2016 Remziye Bor-Yaliniz
Amr El‐Keyi
Halim Yanıkömeroğlu
3
+ Extending Defensive Distillation 2017 Nicolas Papernot
Patrick McDaniel
3
+ PDF Chat On the Number and 3D Placement of Drone Base Stations in Wireless Cellular Networks 2016 Elham Kalantari
Halim Yanıkömeroğlu
Abbas Yongaçoğlu
3
+ Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples. 2016 Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
Somesh Jha
Z. Berkay Celik
Ananthram Swami
2
+ PDF Chat Wireless communications with unmanned aerial vehicles: opportunities and challenges 2016 Yong Zeng
Rui Zhang
Teng Joon Lim
2
+ Test, Learn, Adapt: Developing Public Policy with Randomised Controlled Trials 2012 Laura Haynes
Owain Service
Ben Goldacre
D.F. Torgerson
2
+ Design of a visible-light-communication enhanced WiFi system 2015 Sihua Shao
Abdallah Khreishah
Moussa Ayyash
Michael Rahaim
Hany Elgala
Volker Jungnickel
Dominic Schulz
Thomas D. C. Little
2
+ Wireless Communication Using Unmanned Aerial Vehicles (UAVs): Optimal Transport Theory for Hover Time Optimization 2017 Mohammad Mozaffari
Walid Saad
Mehdi Bennis
Mérouane Debbah
2
+ MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems 2015 Tianqi Chen
Mu Li
Yutian Li
Min Lin
Naiyan Wang
Minjie Wang
Tianjun Xiao
Bing Xu
Chiyuan Zhang
Zheng Zhang
2
+ PDF Chat Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game 2017 Anibal Sanjab
Walid Saad
Tamer Başar
2
+ DeepDGA: Adversarially-Tuned Domain Generation and Detection 2016 Hyrum S. Anderson
Jonathan Woodbridge
Bobby Filar
2
+ Very Deep Convolutional Networks for Large-Scale Image Recognition 2014 Karen Simonyan
Andrew Zisserman
2
+ Improving the Generalization of Adversarial Training with Domain Adaptation 2018 Chuanbiao Song
Kun He
Liwei Wang
John E. Hopcroft
2
+ PDF Chat Maximizing indoor wireless coverage using UAVs equipped with directional antennas 2017 Hazim Shakhatreh
Abdallah Khreishah
Noor Shamsiah Othman
Ahmad Sawalmeh
2
+ Introduction to linear optimization 1997 Dimitris Bertsimas
John N. Tsitsiklis
2
+ PDF Chat Model-Reuse Attacks on Deep Learning Systems 2018 Yujie Ji
Xinyang Zhang
Shouling Ji
Xiapu Luo
Ting Wang
2
+ Sample Complexity of Testing the Manifold Hypothesis 2010 Hariharan Narayanan
Sanjoy K. Mitter
2
+ PDF Chat Survey of Important Issues in UAV Communication Networks 2015 Lav Gupta
Raj Jain
Gabor Vaszkun
2