default search action
Imad H. Elhajj
Person information
- affiliation: American University of Beirut, Department of Electrical and Computer Engineering, Lebanon
- affiliation: Michigan State University, Department of Electrical and Computer Engineering, East Lansing, MI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
Virtual Testing Methods of Cyber-Physical Systems: A Framework for Testing Instrumentation and Measurement Systems. IEEE Instrum. Meas. Mag. 27(8): 11-15 (2024) - [j47]Malak Slim, Naseem A. Daher, Imad H. Elhajj:
Dynamic Bandwidth Allocation for Collaborative Multi-Robot Systems Based on Task Execution Measures. J. Intell. Robotic Syst. 110(3): 114 (2024) - [j46]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
In Situ Sensors for Oil Spill Detection and Thickness Measurement: Methods and Challenges. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [c122]Malak Sayour, Mohamad Karim Yassine, Nadim Dib, Imad H. Elhajj, Boulos Asmar, Elie Khoury, Daniel C. Asmar:
HAC-SLAM: Human Assisted Collaborative 3D-SLAM Through Augmented Reality. ICRA 2024: 12978-12984 - [c121]Batool Ibrahim, Imad H. Elhajj, Daniel C. Asmar:
3D Autocomplete: Enhancing UAV Teleoperation with AI in the Loop. ICRA 2024: 17829-17835 - [i4]Jawad Haidar, Marc Mouawad, Imad H. Elhajj, Daniel C. Asmar:
MaskUno: Switch-Split Block For Enhancing Instance Segmentation. CoRR abs/2407.21498 (2024) - [i3]Yan Song Hu, Nicolas Abboud, Muhammad Qasim Ali, Adam Srebrnjak Yang, Imad H. Elhajj, Daniel C. Asmar, Yuhao Chen, John S. Zelek:
MGSO: Monocular Real-time Photometric SLAM with Efficient 3D Gaussian Splatting. CoRR abs/2409.13055 (2024) - [i2]Nicolas Abboud, Malak Sayour, Imad H. Elhajj, John S. Zelek, Daniel C. Asmar:
Inline Photometrically Calibrated Hybrid Visual SLAM. CoRR abs/2409.16810 (2024) - 2023
- [c120]Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi:
Phishing and Smishing Detection Using Machine Learning. CSR 2023: 206-211 - [c119]Batool Ibrahim, Mohammad Haj Hussein, Imad H. Elhajj, Daniel C. Asmar:
Autocomplete of 3D Motions for UAV Teleoperation. IROS 2023: 7825-7831 - [c118]Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Feature Relevance in NAT Detection Using Explainable AI. ISCC 2023: 1181-1184 - [c117]Mahmoud Altrabolsi, Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
Design Optimization of a Multiphase Coplanar Capacitive Sensor. IST 2023: 1-6 - [c116]Ahmad Amine, Mostafa Aldilati, Hadi Hasan, Noel Maalouf, Imad H. Elhajj:
Human-Robot Interaction using VAHR: Virtual Assistant, Human, and Robots in the Loop. RO-MAN 2023: 2176-2182 - [i1]Ahmad Amine, Mostafa Aldilati, Hadi Hasan, Noel Maalouf, Imad H. Elhajj:
Human-Robot Interaction using VAHR: Virtual Assistant, Human, and Robots in the Loop. CoRR abs/2303.17582 (2023) - 2022
- [j45]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. Ann. des Télécommunications 77(5-6): 395-406 (2022) - [j44]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning. Comput. Networks 204: 108684 (2022) - [j43]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j42]Daniel C. Asmar, Rema Daher, Yasmine Hawari, Hiam Khoury, Imad H. Elhajj:
Automated building and evaluation of 2D as-built floor plans. Mach. Vis. Appl. 33(3): 36 (2022) - [j41]Mahdi Saleh, Ali Rida Tabikh, Imad H. Elhajj, Kristi McKinney, Daniel C. Asmar:
Dual-Modality Capacitive-Ultrasonic Sensing for Measuring Floating Oil Spill Thickness. IEEE Trans. Instrum. Meas. 71: 1-14 (2022) - [c115]Anas Al Shaghouri, Imad H. Elhajj, Daniel C. Asmar:
Real-Time Measurement of Viscosity Using Coplanar Capacitive Sensor. I2MTC 2022: 1-6 - [c114]Mohammad Haj Hussein, Batool Ibrahim, Imad H. Elhajj, Daniel C. Asmar:
Incremental Learning for Enhanced Personalization of Autocomplete Teleoperation. ICRA 2022: 515-521 - [c113]Zahraa Awad, Celine Chibani, Noel Maalouf, Imad H. Elhajj:
Human-Aided Online Terrain Classification for Bipedal Robots Using Augmented Reality. ROBIO 2022: 1352-1358 - [c112]Sheng Bi, Chuanhong Guo, Wenxing Yang, Geoge Zhang, JiangCheng Chen, Yu Wang, Imad H. Elhajj, Roy Vellaisamy:
A software framework for internet telerobot based on ROS. ROBIO 2022: 2311-2316 - [c111]Mahmoud Altrabolsi, Chafic Labaki, Imad H. Elhajj, Daniel C. Asmar:
Detection and Thickness Estimation of Oil under Saline Ice Using Machine Learning. SAS 2022: 1-6 - 2021
- [j40]Zahraa Bassyouni, Imad H. Elhajj:
Augmented Reality Meets Artificial Intelligence in Robotics: A Systematic Review. Frontiers Robotics AI 8 (2021) - [j39]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Data representation for CNN based internet traffic classification: a comparative study. Multim. Tools Appl. 80(11): 16951-16977 (2021) - [j38]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. ACM Trans. Priv. Secur. 24(3): 22:1-22:23 (2021) - [c110]Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach. AICCSA 2021: 1-7 - [c109]Wafic El-Ariss, Naseem A. Daher, Imad H. Elhajj:
To Resume or Not to Resume: A Behavior Tree Extension. ACC 2021: 770-776 - [c108]Mohammad Kassem Zein, Majd Al Aawar, Daniel C. Asmar, Imad H. Elhajj:
Deep Learning and Mixed Reality to Autocomplete Teleoperation. ICRA 2021: 4523-4529 - [c107]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Centralization vs. De-Centralization: Where Does the Network Control Plane Stand? SDS 2021: 1-6 - [d5]Zahraa Awad, Raja Akel, Noel Maalouf, Imad H. Elhajj:
Humanoid Terrain Characterization Dataset. IEEE DataPort, 2021 - 2020
- [j37]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A review on machine learning-based approaches for Internet traffic classification. Ann. des Télécommunications 75(11): 673-710 (2020) - [j36]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Performance analysis of SDN vs OSPF in diverse network environments. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j35]Noel Maalouf, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar:
Biomimetic Energy-Based Humanoid Gait Design. J. Intell. Robotic Syst. 100(1): 203-221 (2020) - [c106]Mohammad Kassem Zein, Abbas Sidaoui, Daniel C. Asmar, Imad H. Elhajj:
Enhanced Teleoperation Using Autocomplete. ICRA 2020: 9178-9184 - [c105]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar, Sally Antoun:
Real-time Detection of Oil Viscosity Using Coplanar Capacitive Sensors. IEEE SENSORS 2020: 1-4 - [c104]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Network Obfuscation for Net Worth Security. SDS 2020: 83-88 - [c103]Joseph Nasr, Georges Younes, Daniel C. Asmar, Imad H. Elhajj:
Resolving Empty Patches in Vision-based Scene Reconstructions. SMC 2020: 3312-3318 - [d4]Peter Beaini, Imad H. Elhajj, Ayman I. Kayssi:
Gaming Network Traffic Dataset. IEEE DataPort, 2020 - [d3]Justin Elhalabi, Majd Al Aawar, Mohammad Kassem Zein, Imad H. Elhajj, Daniel C. Asmar:
Drone Motion Primitive Dataset. IEEE DataPort, 2020 - [d2]Sameh Farhat, Imad H. Elhajj, Ayman I. Kayssi:
NAT Network Traffic Dataset. IEEE DataPort, 2020 - [d1]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
Dataset for binary classification of digital sensor signals. IEEE DataPort, 2020
2010 – 2019
- 2019
- [j34]Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Modelling Cognitive Bias in Crowdsourcing Systems. Cogn. Syst. Res. 58: 1-18 (2019) - [j33]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. Digit. Commun. Networks 5(4): 245-255 (2019) - [j32]Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. EURASIP J. Inf. Secur. 2019: 11 (2019) - [j31]Mahdi Saleh, Ghassan Oueidat, Imad H. Elhajj, Daniel C. Asmar:
In Situ Measurement of Oil Slick Thickness. IEEE Trans. Instrum. Meas. 68(7): 2635-2647 (2019) - [c102]Haytham M. Dbouk, Rayan AlSayed Ali, Mohammad Ghamlouch, Imad H. Elhajj:
Temperature Control for Residential Solar Water Heating Systems. EUROCON 2019: 1-6 - [c101]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
An Opportunistic Approach for Mitigating Fouling in the Measurement of Oil Thickness. I2MTC 2019: 1-6 - [c100]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
Capacitive Sensing for Measuring Oil Thickness Under Fouling Conditions. I2MTC 2019: 1-6 - [c99]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Mobile Traffic Anonymization Through Probabilistic Distribution. ICIN 2019: 242-248 - [c98]Abbas Sidaoui, Mohammad Kassem Zein, Imad H. Elhajj, Daniel C. Asmar:
A-SLAM: Human in-the-loop Augmented SLAM. ICRA 2019: 5245-5251 - [c97]Abbas Sidaoui, Imad H. Elhajj, Daniel C. Asmar:
Collaborative Human Augmented SLAM. IROS 2019: 2131-2138 - [c96]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. MLN 2019: 99-116 - [c95]Ali Hussein, Ola Salman, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. SDS 2019: 146-153 - 2018
- [j30]Serge Mghabghab, Imad H. Elhajj, Daniel C. Asmar:
Personalized teleoperation via intention recognition. Adv. Robotics 32(13): 697-716 (2018) - [j29]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
IoT survey: An SDN and fog computing perspective. Comput. Networks 143: 221-246 (2018) - [j28]Georgi A. Ajaeiya, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Marc Kneppers:
Mobile Apps identification based on network flows. Knowl. Inf. Syst. 55(3): 771-796 (2018) - [c94]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Adaptive Optimization for Hybrid Network Control Planes. AICCSA 2018: 1-8 - [c93]Riwa Mouawi, Mariette Awad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. IIT 2018: 88-92 - [c92]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. INFOCOM Workshops 2018: 27-32 - [c91]Abbas Sidaoui, Imad H. Elhajj, Daniel C. Asmar:
Human-in-the-loop Augmented Mapping. IROS 2018: 3190-3195 - [c90]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A Multi-level Internet Traffic Classifier Using Deep Learning. NOF 2018: 68-75 - [c89]Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A Network Management Framework for SDN. NTMS 2018: 1-4 - [c88]Ali Hussein, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
SDN for QUIC: an enhanced architecture with improved connection establishment. SAC 2018: 2136-2139 - [c87]Ali Hussein, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Machine learning for network resilience: The start of a journey. SDS 2018: 59-66 - [c86]Ola Salman, Louma Chaddad, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Pushing intelligence to the network edge. SDS 2018: 87-92 - [c85]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Network convergence in SDN versus OSPF networks. SDS 2018: 130-137 - 2017
- [j27]Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput. Commun. 98: 20-30 (2017) - [j26]Georges Younes, Rany Kahil, Mayssa Jallad, Daniel C. Asmar, Imad H. Elhajj, George Turkiyyah, Howayda Al-Harithy:
Virtual and augmented reality for rich interaction with cultural heritage sites: A case study from the Roman Theater at Byblos. Digit. Appl. Archaeol. Cult. Heritage 5: 1-9 (2017) - [j25]Georges Younes, Daniel C. Asmar, Imad H. Elhajj, Howayda Al-Harithy:
Pose tracking for augmented reality applications in outdoor archaeological sites. J. Electronic Imaging 26(1): 11004 (2017) - [j24]Sami Malek, Sarah Abdallah, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Low-power and high-speed shift-based multiplier for error tolerant applications. Microprocess. Microsystems 52: 566-574 (2017) - [j23]Noel Maalouf, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar:
Humanoid push recovery using sensory reweighting. Robotics Auton. Syst. 94: 208-218 (2017) - [c84]Ola Salman, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Multi-level security for the 5G/IoT ubiquitous network. FMEC 2017: 188-193 - [c83]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN for MPTCP: An enhanced architecture for large data transfers in datacenters. ICC 2017: 1-7 - [c82]Georgi A. Ajaeiya, Nareg Adalian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Flow-based Intrusion Detection System for SDN. ISCC 2017: 787-793 - [c81]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
QoS guarantee over hybrid SDN/non-SDN networks. NOF 2017: 141-143 - [c80]Georges Chahine, Daniel C. Asmar, Maya Antoun, Elie A. Shammas, Imad H. Elhajj:
Ask the OWL: Object detection constrained by a probabilistic ontological model. ROBIO 2017: 2540-2547 - [c79]Noel Maalouf, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar:
Energy-based control applied to humanoid robots. ROBIO 2017: 2591-2598 - [c78]Noel Maalouf, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar:
Imitating humans: Humanoid gait design based on energy exchange. ROBIO 2017: 2599-2604 - [c77]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN VANETs in 5G: An architecture for resilient security services. SDS 2017: 67-74 - [c76]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Software Defined IoT security framework. SDS 2017: 75-80 - [c75]Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Fuzzy decision system for technology choice in hybrid networks. SDS 2017: 106-111 - 2016
- [j22]Imad H. Elhajj, Mihran Gurunian, Nadeen R. Rishani:
Applied instrumentation for civil engineering at the American University of Beirut. IEEE Instrum. Meas. Mag. 19(6): 46-51 (2016) - [j21]George E. Sakr, Imad H. Elhajj:
VC-based confidence and credibility for support vector machines. Soft Comput. 20(1): 133-147 (2016) - [c74]Raghid Morcel, Hadi Sarieddeen, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs. ACTEA 2016: 178-183 - [c73]Abed AlRahman Al Makdah, Elie A. Shammas, Naseem A. Daher, Imad H. Elhajj:
Modeling and optimal three-dimensional trajectory tracking for an autonomous underwater vehicle. AIM 2016: 172-177 - [c72]Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach. IC2E Workshops 2016: 30-35 - [c71]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN Security Plane: An Architecture for Resilient Security Services. IC2E Workshops 2016: 54-59 - [c70]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN verification plane for consistency establishment. ISCC 2016: 519-524 - [c69]Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Identity-based authentication scheme for the Internet of Things. ISCC 2016: 1109-1111 - [c68]Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Wassim Itani:
NCaaS: network configuration as a service in SDN-driven cloud architectures. SAC 2016: 448-454 - [c67]Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A crowdsourcing game-theoretic intrusion detection and rating system. SAC 2016: 622-625 - [c66]Farah Saab, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Solving sybil attacks using evolutionary game theory. SAC 2016: 2195-2201 - 2015
- [j20]Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
G-Route: an energy-aware service routing protocol for green cloud computing. Clust. Comput. 18(2): 889-908 (2015) - [j19]Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Energy-Efficient Security for Voice over IP. Int. J. Netw. Secur. 17(1): 7-22 (2015) - [j18]Khodor Hamandi, Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Messaging Attacks on Android: Vulnerabilities and Intrusion Detection. Mob. Inf. Syst. 2015: 746930:1-746930:13 (2015) - [j17]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj, Wassim Itani:
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks. Sensors 15(2): 3299-3333 (2015) - [j16]Salwa Adriana Saab, Farah Saab, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Partial mobile application offloading to the cloud for energy-efficiency with security measures. Sustain. Comput. Informatics Syst. 8: 38-46 (2015) - [c65]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
An architecture for the Internet of Things with decentralized data and centralized control. AICCSA 2015: 1-8 - [c64]Ali Kanso, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar:
Enhanced teleoperation of UAVs with haptic feedback. AIM 2015: 305-310 - [c63]Noel Maalouf, Imad H. Elhajj, Daniel C. Asmar, Elie A. Shammas:
Model-free human-like humanoid push recovery. ROBIO 2015: 1560-1565 - [c62]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Edge computing enabling the Internet of Things. WF-IoT 2015: 603-608 - [c61]Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Comparison of in-app ads traffic in different ad networks. WiMob 2015: 581-587 - 2014
- [j15]Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Fast dynamic internet mapping. Future Gener. Comput. Syst. 39: 55-66 (2014) - [j14]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Decentralised malicious node detection in WSN. Int. J. Space Based Situated Comput. 4(1): 15-25 (2014) - [c60]Khaled Bakhit, Chantal Chalouhi, Sabine Francis, Sara Mourad, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
3G to Wi-Fi offloading on Android. AICCSA 2014: 247-252 - [c59]Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Mobile malware exposed. AICCSA 2014: 253-258 - [c58]Khaled Bakhit, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
DAGGER: Distributed architecture for granular mitigation of mobile based attacks. AICCSA 2014: 259-265 - [c57]Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
CrowdApp: Crowdsourcing for application rating. AICCSA 2014: 551-556 - [c56]Joseph Loutfi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Smartphone sensors as random bit generators. AICCSA 2014: 773-780 - [c55]Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Application-Aware Fast Dormancy in LTE. AINA 2014: 194-201 - [c54]Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
DAIDS: An Architecture for Modular Mobile IDS. AINA Workshops 2014: 328-333 - [c53]Ayman Mukaddam, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
IP Spoofing Detection Using Modified Hop Count. AINA 2014: 512-516 - [c52]Khaled Bakhit, Sirine Taleb, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
CAVE: Hybrid Approach for In-Network Content Caching. UIC/ATC/ScalCom 2014: 649-654 - 2013
- [j13]Jalal Awed, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Perception-aware packet-loss resilient compression for networked haptic systems. Comput. Commun. 36(15-16): 1621-1628 (2013) - [j12]George E. Sakr, Imad H. Elhajj:
Decision confidence-based multi-level support vector machines. Eng. Appl. Artif. Intell. 26(8): 1892-1901 (2013) - [j11]Amena Amro, Imad H. Elhajj, Mariette Awad:
Energy-Aware Discrete Probabilistic Localization of Wireless Sensor Networks. Intell. Autom. Soft Comput. 19(3): 407-423 (2013) - [c51]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Malicious Node Detection in Wireless Sensor Networks. AINA Workshops 2013: 456-461 - [c50]Ramzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Effects of Signaling Attacks on LTE Networks. AINA Workshops 2013: 499-504 - [c49]Khodor Hamandi, Imad Sarji, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme. AINA Workshops 2013: 929-934 - [c48]Khodor Hamandi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Android SMS Malware: Vulnerability and Mitigation. AINA Workshops 2013: 1004-1009 - [c47]Firas Abi-Farraj, Daniel C. Asmar, Elie A. Shammas, Imad H. Elhajj:
Non-iterative planar visual odometry using a monocular camera. ICAR 2013: 1-6 - [c46]Naoum Sayegh, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Internal security attacks on SCADA systems. ICCIT 2013: 22-27 - [c45]Wassim Itani, Cesar Ghali, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Accountable energy monitoring for green service routing in the cloud. ICCIT 2013: 103-108 - [c44]Ramzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A resource reservation attack against LTE networks. ICCIT 2013: 262-268 - [c43]Ibrahim Abdelghany, Wajeb Saab, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Energy-efficient truncated multipliers. ICEAC 2013: 34-39 - [c42]Sarah Abdallah, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
TABSH: Tag-based stochastic hardware. ICEAC 2013: 115-120 - [c41]Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Energy-efficient HEVC using stochastic processing. ICEAC 2013: 152-157 - [c40]Ibrahim Abdelghany, Wajeb Saab, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Energy-efficient truncated multipliers with scaling. IDT 2013: 1-6 - [c39]Faisal Hamady, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
User experience-based mechanism for preserving energy in graphics-intensive applications. NEWCAS 2013: 1-4 - [c38]Khodor Hamandi, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi. WTS 2013: 1-6 - 2012
- [j10]Imad H. Elhajj, Wissam Mansour:
Lamac: Load Adaptive IEEE 802.15.4 Medium Access Control. Ad Hoc Sens. Wirel. Networks 15(2-4): 293-313 (2012) - [c37]Jalal Awed, Imad H. Elhajj, Nadiya Slobodenyuk:
Haptic Force Perception in Bimanual Manipulation. EuroHaptics (2) 2012: 1-6 - [c36]Sarah Abdallah, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Stochastic hardware architectures: A survey. ICEAC 2012: 1-6 - [c35]Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Energy efficient JPEG using stochastic processing. ICEAC 2012: 1-6 - [c34]Khodor Hamandi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Android SMS botnet: a new perspective. MOBIWAC 2012: 125-130 - [c33]Ramzi Bassil, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Signaling oriented denial of service on LTE networks. MOBIWAC 2012: 153-158 - [c32]Bassam Jalgha, Daniel C. Asmar, Elie A. Shammas, Imad H. Elhajj:
Hierarchical fall avoidance strategy for small-scale humanoid robots. ROBIO 2012: 1-7 - [c31]Chadi Mansour, Elie A. Shammas, Imad H. Elhajj, Daniel C. Asmar:
Dynamic bandwidth management for teleoperation of collaborative robots. ROBIO 2012: 1861-1866 - 2011
- [j9]Imad H. Elhajj, Nadine Bou Dargham, Ning Xi, Yunyi Jia:
Real-Time Adaptive Content-Based Synchronization of Multimedia Streams. Adv. Multim. 2011: 914062:1-914062:13 (2011) - [j8]Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
E2VoIP2: Energy efficient voice over IP privacy. Comput. Secur. 30(8): 815-829 (2011) - [j7]George E. Sakr, Imad H. Elhajj, George H. Mitri:
Efficient forest fire occurrence prediction for developing countries using two weather parameters. Eng. Appl. Artif. Intell. 24(5): 888-894 (2011) - [c30]Ayman Mukaddam, Imad H. Elhajj:
Hop count variability. ICITST 2011: 240-244 - [c29]Bassam Jalgha, Daniel C. Asmar, Imad H. Elhajj:
A hybrid ankle/hip preemptive falling scheme for humanoid robots. ICRA 2011: 1256-1262 - [c28]Cesar Ghali, Faisal Hamady, Imad H. Elhajj, Ayman I. Kayssi:
Matryoshka: Tunneled packets breaking the rules. HPCS 2011: 485-490 - [c27]Chadi Mansour, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar:
Event-based dynamic bandwidth management for teleoperation. ROBIO 2011: 229-233 - [c26]Dima Chdid, Raja Oueis, Hiam Khoury, Daniel C. Asmar, Imad H. Elhajj:
Inertial-vision sensor fusion for pedestrian localization. ROBIO 2011: 1695-1701 - [c25]George E. Sakr, Imad H. Elhajj:
Digit recognition with confidence. SiPS 2011: 299-304 - 2010
- [j6]George E. Sakr, Imad H. Elhajj, Huda Abu-Saad Huijer:
Support Vector Machines to Define and Detect Agitation Transition. IEEE Trans. Affect. Comput. 1(2): 98-108 (2010) - [c24]Samir Shaker, Daniel C. Asmar, Imad H. Elhajj:
3D reconstruction of indoor scenes by casting visual rays in an occupancy grid. ROBIO 2010: 1176-1182 - [c23]Lare I. Ammar, Bilal Y. Kaddouh, Mariam K. Mohanna, Imad H. Elhajj:
SAS: SMA Aiding Sleeve. ROBIO 2010: 1596-1599
2000 – 2009
- 2009
- [j5]Hovig Denkilkian, Agop Koulakezian, Rostom Ohannessian, Milad S. Chalfoun, Mohamad Khaled Joujou, Ali Chehab, Imad H. Elhajj:
Wireless Sensor for Continuous Real-Time Oil Spill Thickness and Location Measurement. IEEE Trans. Instrum. Meas. 58(12): 4001-4011 (2009) - [c22]Zhuxin Dong, Uchechukwu C. Wejinya, Imad H. Elhajj, M. Meyyappan:
Characterization of vertically aligned carbon nanofibers grown on Ni dots nanoelectrode array using Atomic Force Microscopy. IROS 2009: 1861-1866 - [c21]Saleem Wehbe, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain. NTMS 2009: 1-5 - [c20]Zhuxin Dong, Uchechukwu C. Wejinya, Holly D. Tourtillott, Imad H. Elhajj, M. Meyyappan:
Scanning and measurement of carbon nanofiber nanoelectrode arrays using Atomic Force Microscopy. ROBIO 2009: 1-6 - 2008
- [c19]Nancy Dib, Imad H. Elhajj, Sally Antoun, Georges Al-Hajj:
Gastrectomy surgical assistive instrument for accurate remnant stomach volume. ROBIO 2008: 518-523 - 2007
- [c18]John Meyer, Fatma Mili, Imad H. Elhajj:
Selective Querying in Sensor Networks: Parameters and Strategies. AINA 2007: 323-330 - 2006
- [c17]Swapna Ghanekar, Fatma Mili, Imad H. Elhajj:
Agile Sensor Networks: Adaptive Coverage via Mobile Nodes. FLAIRS 2006: 466-471 - [c16]Lidia Mudura, Matthew Bruer, Imad H. Elhajj, Gary Moore, Patricia T. Ketcham:
A Virtual Nursing Simulator with Haptic Feedback for Nasotracheal Suctioning. IROS 2006: 698-703 - [c15]Imad H. Elhajj, Hesiri Weerasinghe, Ali Dika, Ranald Hansen:
Human Perception of Haptic Force Direction. IROS 2006: 989-993 - [c14]Imad H. Elhajj, Jason Gorski:
Sensor Network and Robot Interaction Using Coarse Localization. IROS 2006: 1434-1439 - 2005
- [c13]Jason Gorski, Lela Wilson, Imad H. Elhajj, Jindong Tan:
Data fusion and error reduction algorithms for sensor networks. IROS 2005: 610-615 - 2004
- [c12]Imad H. Elhajj, Ning Xi, Yunhui Liu, Toshio Fukuda:
Event-synchronization for supermedia enhanced teleoperation. IROS 2004: 2526-2531 - 2003
- [j4]Imad H. Elhajj, Ning Xi, Wai-Keung Fung, Yun-Hui Liu, Yasuhisa Hasegawa, Toshio Fukuda:
Multi-site real-time tele-cooperation via the Internet. Adv. Robotics 17(3): 235-251 (2003) - [j3]Imad H. Elhajj, Amit Goradia, Ning Xi, Chow Man Kit, Yun-Hui Liu, Toshio Fukuda:
Design and Analysis of Internet-Based Tele-Coordinated Multi-Robot Systems. Auton. Robots 15(3): 237-254 (2003) - [j2]Imad H. Elhajj, Ning Xi, Wai-Keung Fung, Yun-Hui Liu, Yasuhisa Hasegawa, Toshio Fukuda:
Supermedia-enhanced Internet-based telerobotics. Proc. IEEE 91(3): 396-421 (2003) - [c11]Imad H. Elhajj, Ning Xi, Amit Goradia, Chow Man Kit, Yun-Hui Liu, Toshio Fukuda:
Tele-coordinated control of multi-robot systems via the internet. ICRA 2003: 1646-1652 - [c10]Wang Tai Lo, Yun-Hui Liu, Imad H. Elhajj, Ning Xi, Yinghai Shi, Yuechao Wang:
Co-operative control of internet based multi-robot systems witb force reflection. ICRA 2003: 4414-4419 - [c9]Wai-Keung Fung, Ning Xi, Wang Tai Lo, BooHeon Song, Yu Sun, Yunhui Liu, Imad H. Elhajj:
Task driven dynamic QoS based bandwidth allocation for real-time teleoperation via the Internet. IROS 2003: 1094-1099 - 2002
- [j1]Imad H. Elhajj, Jindong Tan, Ning Xi, Wai-Keung Fung, Yunhui Liu, Tomoyuki Kaga, Yasuhisa Hasegawa, Toshio Fukuda:
Multi-site Internet-based tele-cooperation. Integr. Comput. Aided Eng. 9(2): 117-127 (2002) - [c8]Carmen Kar Man Fung, Imad H. Elhajj, Wen J. Li, Ning Xi:
A 2-D PVDF Force Sensing System for Micro-Manipulation and Micro-Assembly. ICRA 2002: 1489-1494 - [c7]Imad H. Elhajj, Ning Xi, BooHeon Song, Mengmeng Yu, Wang Tai Lo, Yun-Hui Liu:
Transparency and Synchronization in Supermedia Enhanced Internet-Based Teleoperation. ICRA 2002: 2713-2718 - [c6]Imad H. Elhajj, Jindong Tan, Yu Sun, Ning Xi:
Supermedia enhanced human/machine cooperative control of robot formations. IROS 2002: 1296-1301 - 2001
- [c5]Antony W. T. Ho, Wen J. Li, Imad H. Elhajj, Ning Xi, Tao Mei:
A Bone-reaming System Using Micro Sensors for Internet Force-feedback Control. ICRA 2001: 656-661 - [c4]Imad H. Elhajj, Ning Xi, Wai-Keung Fung, Yun-Hui Liu, Yasuhisa Hasegawa, Toshio Fukuda:
Modeling and Control of Internet Based Cooperative Teleoperation. ICRA 2001: 662-667 - [c3]Imad H. Elhajj, Ning Xi, Wai-Keung Fung, Yun-Hui Liu, Wen Jung Li, Tomoyuki Kaga, Toshio Fukuda:
Supermedia in Internet-Based Telerobotic Operations. MMNS 2001: 359-372 - 2000
- [c2]Imad H. Elhajj, Ning Xi, Yun-Hui Liu:
Real-Time Control of Internet Based Teleoperation with Force Reflection. ICRA 2000: 3284-3289 - [c1]Imad H. Elhajj, Jindong Tan, Ning Xi, Wai-Keung Fung, Yun-Hu Liu, Tomoyuki Kaga, Yasuhisa Hasegawa, Toshio Fukuda:
Multi-site Internet-based cooperative control of robotic operations. IROS 2000: 826-831
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint