Skip to main content

Showing 1–6 of 6 results for author: El-Khatib, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2509.01592  [pdf, ps, other

    cs.CR cs.AI cs.LG eess.SY

    Securing Radiation Detection Systems with an Efficient TinyML-Based IDS for Edge Devices

    Authors: Einstein Rivas Pizarro, Wajiha Zaheer, Li Yang, Khalil El-Khatib, Glenn Harvel

    Abstract: Radiation Detection Systems (RDSs) play a vital role in ensuring public safety across various settings, from nuclear facilities to medical environments. However, these systems are increasingly vulnerable to cyber-attacks such as data injection, man-in-the-middle (MITM) attacks, ICMP floods, botnet attacks, privilege escalation, and distributed denial-of-service (DDoS) attacks. Such threats could c… ▽ More

    Submitted 1 September, 2025; originally announced September 2025.

    Comments: Preprint author original pre review. Accepted and Presented at NPIC & HMIT 2025. The official proceedings version is available in the ANS Digital Library

    MSC Class: 68T05; 93C65; 90C35 ACM Class: K.6.5; C.2.3; I.2.6

    Journal ref: Proc. NPIC HMIT 2025 pp. 651-661 (2025)

  2. A Visual Analytics Framework for Adversarial Text Generation

    Authors: Brandon Laughlin, Christopher Collins, Karthik Sankaranarayanan, Khalil El-Khatib

    Abstract: This paper presents a framework which enables a user to more easily make corrections to adversarial texts. While attack algorithms have been demonstrated to automatically build adversaries, changes made by the algorithms can often have poor semantics or syntax. Our framework is designed to facilitate human intervention by aiding users in making corrections. The framework extends existing attack al… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Journal ref: 2019 IEEE Symposium on Visualization for Cyber Security (VizSec)

  3. arXiv:1512.03498  [pdf

    cs.CR

    A Secure Database System using Homomorphic Encryption Schemes

    Authors: Youssef Gahi, Mouhcine Guennoun, Khalil El-Khatib

    Abstract: Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject since… ▽ More

    Submitted 10 December, 2015; originally announced December 2015.

  4. An Encrypted Trust-Based Routing Protocol

    Authors: Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib

    Abstract: The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme.… ▽ More

    Submitted 10 December, 2015; originally announced December 2015.

  5. arXiv:1508.05411  [pdf

    cs.CR cs.NI

    On the use of homomorphic encryption to secure cloud computing, services, and routing protocols

    Authors: Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-khatib

    Abstract: The trend towards delegating data processing to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication protocols. Most of the proposed techniques, however, requir… ▽ More

    Submitted 21 August, 2015; originally announced August 2015.

    Comments: Youssef Gahi, PhD dissertation, 2013

  6. arXiv:1311.3231  [pdf

    cs.CY

    Infrastructure Logicielle d un Environnement Hospitalier Intelligent

    Authors: Youssef Gahi, Meryem Lamrani, Mouhcine Guennoun, Khalil El-Khatib

    Abstract: The impact of new technologies in the field of healthcare has been proven to be satisfactory in improving the quality of care and services for patients. The hospital environment is undoubtedly one of the environments where human or hardware errors can cause harmful damage. It is therefore very useful for the sector to be at the forefront of technology and use the strongest and most efficient means… ▽ More

    Submitted 12 November, 2013; originally announced November 2013.

    Comments: 50 pages. Master thesis 2008