Ali Chehab
American University of Beirut
H-index: 39
Asia-Lebanon
Top articles of Ali Chehab
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications | arXiv preprint arXiv:2403.17787 | Fouad Trad Ali Chehab | 2024/3/26 |
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models | Machine Learning and Knowledge Extraction | Fouad Trad Ali Chehab | 2024/2/6 |
Lesca: Lightweight stream cipher algorithm for emerging systems | Ad Hoc Networks | Hassan Noura Ola Salman Raphaël Couturier Ali Chehab | 2023/1/1 |
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms | Journal of Information Security and Applications | Hassan N Noura Ola Salman Ali Chehab | 2023/8/1 |
High-Density FeFET-based CAM Cell Design Via Multi-Dimensional Encoding | Hadi Noureddine Omar Bekdache Mohamad Al Tawil Rouwaida Kanj Ali Chehab | 2023/6/5 | |
Machine learning‐based anti‐jamming technique at the physical layer | Concurrency and Computation: Practice and Experience | Mahdi Chehimi Mohamad Khattar Awad Mohammed Al‐Husseini Ali Chehab | 2023/4/25 |
Leveraging Adversarial Samples for Enhanced Classification of Malicious and Evasive PDF Files | Applied Sciences | Fouad Trad Ali Hussein Ali Chehab | 2023/3/8 |
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations | Internet of Things and Cyber-Physical Systems | Jean-Paul A Yaacoub Hassan N Noura Ola Salman Ali Chehab | 2023/1/1 |
Assessing the effectiveness of siamese neural networks to mitigate frequent retraining in IoT device identification models | Fouad Trad Ali Hussein Ali Chehab | 2023/8/16 | |
Novel one round message authentication scheme for constrained IoT devices | Journal of Ambient Intelligence and Humanized Computing | Hassan N Noura Ola Salman Raphaël Couturier Ali Chehab | 2022/1/1 |
A single-pass and one-round message authentication encryption for limited IoT devices | IEEE Internet of Things Journal | Hassan N Noura Ola Salman Raphaël Couturier Ali Chehab | 2022/3/22 |
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms | Journal of Information Security and Applications | Hassan N Noura Ali Chehab | 2022/8/1 |
Free Text Keystroke Dynamics-based Authentication with Continuous Learning: A Case Study | Fouad Trad Ali Hussein Ali Chehab | 2022/12/19 | |
A machine learning based framework for IoT device identification and abnormal traffic detection | Transactions on Emerging Telecommunications Technologies | Ola Salman Imad H Elhajj Ali Chehab Ayman Kayssi | 2019/9 |
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations | Jean-Paul A Yaacoub Hassan N Noura Ola Salman Ali Chehab | 2022/8/1 | |
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning | Computer Networks | Ola Salman Imad H Elhajj Ali Chehab Ayman Kayssi | 2022/2/26 |
Using siamese neural networks for efficient and accurate IoT device identification | Fouad Trad Ali Hussein Ali Chehab | 2022/12/12 | |
Mutated traffic detection and recovery: an adversarial generative deep learning approach | Annals of Telecommunications | Ola Salman Imad H Elhajj Ayman Kayssi Ali Chehab | 2022/4/23 |
Group LARS-Based Iterative Reweighted Least Squares Methodology for Efficient Statistical Modeling of Memory Designs | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Lama Shaer Rouwaida Kanj Rajiv Joshi Ali Chehab | 2022/2/10 |
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability | Hassan N Noura Ola Salman Ali Chehab Raphael Couturier | 2022/10/19 |