default search action
Karim Khalil
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil:
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection. CoRR abs/2408.02329 (2024) - 2021
- [c14]Karim Khalil, Maksim Stankevich, Ivan V. Smirnov, Maria Danina:
Predicting Different Health and Lifestyle Behaviors of Social Media Users. RCAI 2021: 57-66 - 2020
- [c13]Karim Khalil, Maksim Stankevich, Ivan V. Smirnov, Maria Danina:
Detection of Social Media Users Who Lead a Healthy Lifestyle. RCAI 2020: 240-250 - [i4]Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks. CoRR abs/2008.11772 (2020)
2010 – 2019
- 2018
- [c12]Hisham Alhulayyil, Karim Khalil, Srikanth V. Krishnamurthy, Derya Cansever, Thomas La Porta, Ananthram Swami:
On the Detection of Adaptive Side-Channel Attackers in Cloud Environments. GLOBECOM 2018: 1-6 - [c11]Karim Khalil, Azeem Aqil, Srikanth V. Krishnamurthy, Tarek F. Abdelzaher, Lance M. Kaplan:
NEST: Efficient Transport of Data Summaries over Named Data Networks. Networking 2018: 280-288 - 2017
- [c10]Azeem Aqil, Karim Khalil, Ahmed Osama Fathy Atya, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Trent Jaeger, K. K. Ramakrishnan, Paul L. Yu, Ananthram Swami:
Jaal: Towards Network Intrusion Detection at ISP Scale. CoNEXT 2017: 134-146 - [c9]Tuan Dao, Karim Khalil, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy, Lance M. Kaplan:
Energy Efficient Object Detection in Camera Sensor Networks. ICDCS 2017: 1208-1218 - [c8]Ahmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta:
Stalling Live Migrations on the Cloud. WOOT 2017 - 2016
- [c7]Karim Khalil, Zhiyun Qian, Paul L. Yu, Srikanth V. Krishnamurthy, Ananthram Swami:
Optimal Monitor Placement for Detection of Persistent Threats. GLOBECOM 2016: 1-6 - 2015
- [j4]Karim Khalil, Eylem Ekici:
Turning foes to allies in cognitive radio networks. Ad Hoc Networks 25: 237-250 (2015) - 2014
- [j3]Karim Khalil, Golnaz Farhadi, Akira Ito:
Iterative Fair Channel Assignment for Wireless Networks. IEEE Wirel. Commun. Lett. 3(2): 145-148 (2014) - [c6]Karim Khalil, Eylem Ekici:
Collisions for secrecy in cooperative cognitive radio networks with time-varying connectivity. GLOBECOM Workshops 2014: 1332-1336 - [c5]Karim Khalil, Golnaz Farhadi, Akira Ito:
Coexistence management for heterogeneous networks in white spaces. ICNC 2014: 691-697 - 2013
- [j2]Karim Khalil, Onur Ozan Koyluoglu, Hesham El Gamal, Moustafa Youssef:
Opportunistic Secrecy with a Strict Delay Constraint. IEEE Trans. Commun. 61(11): 4700-4709 (2013) - [j1]Mehmet Karaca, Karim Khalil, Eylem Ekici, Özgür Erçetin:
Optimal Scheduling and Power Allocation in Cooperate-to-Join Cognitive Radio Networks. IEEE/ACM Trans. Netw. 21(6): 1708-1721 (2013) - [c4]Karim Khalil, Eylem Ekici:
Secrecy in cognitive radio networks: Turning foes to allies. WiOpt 2013: 194-200 - 2012
- [c3]Karim Khalil, Eylem Ekici:
Multiple access game with a cognitive jammer. ACSCC 2012: 1383-1387 - [i3]Karim Khalil, Eylem Ekici:
Multiple Access Games with a Cognitive Eavesdropper. CoRR abs/1211.4053 (2012) - 2011
- [c2]Karim Khalil, Mehmet Karaca, Özgür Erçetin, Eylem Ekici:
Optimal scheduling in cooperate-to-join Cognitive Radio Networks. INFOCOM 2011: 3002-3010
2000 – 2009
- 2009
- [c1]Karim Khalil, Moustafa Youssef, Onur Ozan Koyluoglu, Hesham El Gamal:
On the delay limited secrecy capacity of fading channels. ISIT 2009: 2617-2621 - [i2]Karim Khalil, Moustafa Youssef, Onur Ozan Koyluoglu, Hesham El Gamal:
On the Delay Limited Secrecy Capacity of Fading Channels. CoRR abs/0901.2616 (2009) - [i1]Karim Khalil, Onur Ozan Koyluoglu, Hesham El Gamal, Moustafa Youssef:
Opportunistic Secrecy with a Strict Delay Constraint. CoRR abs/0907.3341 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint