• RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database 

      Al-Sa'd M.F.; Al-Ali A.; Mohamed A.; Khattab T.; Erbad A. ( Elsevier B.V. , 2019 , Article)
      The omnipresence of unmanned aerial vehicles, or drones, among civilians can lead to technical, security, and public safety issues that need to be addressed, regulated and prevented. Security agencies are in continuous ...
    • Robust Decentralized Federated Learning Using Collaborative Decisions 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Federated Learning (FL) has attracted a lot of attention in numerous applications due to recent data privacy regulations and increased awareness about data handling issues, combined with the ever-increasing big-data sizes. ...
    • Robust secret key extraction from channel secondary random process 

      Badawy A.; Elfouly T.; Khattab T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( John Wiley and Sons Ltd , 2016 , Conference Paper)
      The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
    • Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF 

      Amir M.; Khattab T.; Elfouly T.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
    • Secret key generation based on AoA estimation for low SNR conditions 

      Badawy A.; Khattab T.; El-Fouly T.; Mohamed A.; Trinchero D.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
    • Secret key generation based on channel and distance measurements 

      Badawy A.; Khattab T.; ElFouly T.; Mohamed A.; Trinchero D. ( IEEE Computer Society , 2014 , Conference Paper)
      Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
    • Sequential random selection relaying for energy efficient wireless sensor networks 

      Mousavifar S.A.; Khattab T.; Hasna , Mazen ( IEEE , 2010 , Conference Paper)
      In a wireless sensor network with relaying capability, intermediate relay nodes are with limited energy budget. To maximize lifetime of relay nodes, selective relay strategies, requiring full channel state information ...
    • Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey 

      Almohamad A.; Tahir A.M.; Al-Kababji A.; Furqan H.M.; Khattab T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      With the emergence of the Internet of Things (IoT) technology, wireless connectivity should be more ubiquitous than ever. In fact, the availability of wireless connection everywhere comes with security threats that, ...
    • Thresholds optimization for one-bit feedback multi-user scheduling 

      Hafez M.; El Shafie A.; Shaqfeh M.; Khattab T.; Alnuweiri H.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the 2-user case and provide the optimal solution which achieves the maximum weighted ...
    • To Relay or Not To Relay in Cognitive Radio Sensor Networks 

      Foukalas, F.; Khattab, T. ( IEEE , 2014 , Article)
      A recent investigation on MAC layer in cognitive radio networks proposed the primary packet relaying by the secondary node maintaining an extra queue used for this particular addable functionality. Nevertheless, relaying ...
    • Towards Secure IoT Networks in Healthcare Applications: A Game Theoretic Anti-Jamming Framework 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource constrained smart devices. This makes such networks exposed to various types of malicious attacks. In particular, jamming ...
    • VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results 

      Du D.; Wen L.; Zhu P.; Fan H.; Hu Q.; ... more authors ( Springer Science and Business Media Deutschland GmbH , 2020 , Conference Paper)
      Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing ...