default search action
Basel Alomair
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. ESORICS (1) 2024: 105-124 - [i11]Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen:
Vulnerability Detection with Code Language Models: How Far Are We? CoRR abs/2403.18624 (2024) - 2023
- [i10]Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. CoRR abs/2312.17673 (2023)
2010 – 2019
- 2019
- [j22]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
On the Structure and Computation of Random Walk Times in Finite Graphs. IEEE Trans. Autom. Control. 64(11): 4470-4483 (2019) - 2018
- [j21]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach. IEEE Trans. Control. Netw. Syst. 5(1): 583-596 (2018) - [j20]Andrew Clark, Phillip Lee, Basel Alomair, Linda Bushnell, Radha Poovendran:
Combinatorial Algorithms for Control of Biological Regulatory Networks. IEEE Trans. Control. Netw. Syst. 5(2): 748-759 (2018) - 2017
- [j19]Hongjiang Lei, Jianming Zhang, Ki-Hong Park, Peng Xu, Imran Shafique Ansari, Gaofeng Pan, Basel Alomair, Mohamed-Slim Alouini:
On Secure NOMA Systems With Transmit Antenna Selection Schemes. IEEE Access 5: 17450-17464 (2017) - [j18]Hongjiang Lei, Imran Shafique Ansari, Gaofeng Pan, Basel Alomair, Mohamed-Slim Alouini:
Secrecy Capacity Analysis Over α-μ Fading Channels. IEEE Commun. Lett. 21(6): 1445-1448 (2017) - [j17]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Input Selection for Performance and Controllability of Structured Linear Descriptor Systems. SIAM J. Control. Optim. 55(1): 457-485 (2017) - [j16]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework. IEEE Trans. Autom. Control. 62(10): 5055-5068 (2017) - [j15]Zouheir Rezki, Marwen Zorgui, Basel Alomair, Mohamed-Slim Alouini:
Secret Key Agreement: Fundamental Limits and Practical Challenges. IEEE Wirel. Commun. 24(3): 72-79 (2017) - [i9]Andrew Clark, Phillip Lee, Basel Alomair, Linda Bushnell, Radha Poovendran:
Combinatorial Algorithms for Control of Biological Regulatory Networks. CoRR abs/1701.05273 (2017) - [i8]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
On the Structure and Computation of Random Walk Times in Finite Graphs. CoRR abs/1709.01633 (2017) - 2016
- [j14]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
Secret-Key Agreement With Public Discussion Subject to an Amplitude Constraint. IEEE Commun. Lett. 20(6): 1124-1127 (2016) - [j13]Basel Alomair:
Authenticated encryption: how reordering can impact performance. Secur. Commun. Networks 9(18): 6173-6188 (2016) - [j12]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Eduard A. Jorswieck, Mohamed-Slim Alouini:
On the Ergodic Secret-Key Agreement Over Spatially Correlated Multiple-Antenna Channels With Public Discussion. IEEE Trans. Signal Process. 64(2): 495-510 (2016) - [j11]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
The Diversity-Multiplexing Tradeoff of Secret-Key Agreement Over Multiple Antenna Channels. IEEE Trans. Wirel. Commun. 15(2): 1562-1574 (2016) - [j10]Xinyu Zhou, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
Achievable Rates of Secure Transmission in Gaussian MISO Channel With Imperfect Main Channel Estimation. IEEE Trans. Wirel. Commun. 15(6): 4470-4485 (2016) - [c30]Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. CANS 2016: 265-283 - [c29]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Distributed adaptive patching strategies against malware propagation: A passivity approach. CDC 2016: 2587-2594 - [c28]Anas Chaaban, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
The MISO wiretap channel with channel uncertainty: Asymptotic perspectives. GlobalSIP 2016: 959-963 - [c27]Zouheir Rezki, Anas Chaaban, Basel Alomair, Mohamed-Slim Alouini:
The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime. GLOBECOM 2016: 1-5 - [i7]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach. CoRR abs/1603.04374 (2016) - [i6]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint. CoRR abs/1604.00107 (2016) - [i5]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Submodularity in Input Node Selection for Networked Systems. CoRR abs/1605.09465 (2016) - [i4]Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. IACR Cryptol. ePrint Arch. 2016: 908 (2016) - 2015
- [c26]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Jamming-based adversarial control of network flow allocation: A passivity approach. ACC 2015: 4710-4716 - [c25]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Input selection for disturbance rejection in networked cyber-physical systems. CDC 2015: 954-961 - [c24]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
A host takeover game model for competing malware. CDC 2015: 4523-4530 - [c23]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Eduard A. Jorswieck, Mohamed-Slim Alouini:
Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime. CNS 2015: 719-720 - [c22]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games. GameSec 2015: 113-129 - [c21]Xinyu Zhou, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
Achievable Rates of Secure Transmission in Gaussian MISO Channel with Imperfect Main Channel Estimation. GLOBECOM Workshops 2015: 1-6 - [c20]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion. ISIT 2015: 2156-2160 - [c19]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Scalable and distributed submodular maximization with matroid constraints. WiOpt 2015: 435-442 - 2014
- [j9]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach. IEEE Trans. Autom. Control. 59(6): 1480-1494 (2014) - [j8]Basel Alomair, Radha Poovendran:
E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. IEEE Trans. Computers 63(1): 204-217 (2014) - [j7]Basel Alomair, Radha Poovendran:
Efficient Authentication for Mobile and Pervasive Computing. IEEE Trans. Mob. Comput. 13(3): 469-481 (2014) - [c18]Basel Alomair:
Universal Hash-Function Families: From Hashing to Authentication. AFRICACRYPT 2014: 459-474 - [c17]Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels. Allerton 2014: 175-182 - [c16]Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini:
On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation. GLOBECOM 2014: 1602-1607 - [c15]Phillip Lee, Omar Saleh, Basel Alomair, Linda Bushnell, Radha Poovendran:
Graph-based verification and misbehavior detection in multi-agent networks. HiCoNS 2014: 77-84 - [c14]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Distributed online submodular maximization in resource-constrained networks. WiOpt 2014: 397-404 - [i3]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework. CoRR abs/1411.5797 (2014) - [i2]Basel Alomair:
Authenticated Encryption: How Reordering can Impact Performance. IACR Cryptol. ePrint Arch. 2014: 958 (2014) - 2013
- [j6]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Toward a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Trans. Mob. Comput. 12(2): 248-260 (2013) - [c13]Chouchang Yang, Basel Alomair, Radha Poovendran:
Optimized relay-route assignment for anonymity in wireless networks. ISIT 2013: 76-80 - [i1]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach. CoRR abs/1306.4949 (2013) - 2012
- [j5]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification. IEEE Trans. Parallel Distributed Syst. 23(8): 1536-1550 (2012) - [c12]Basel Alomair:
Authenticated Encryption: How Reordering Can Impact Performance. ACNS 2012: 84-99 - [c11]Chouchang Yang, Basel Alomair, Radha Poovendran:
Multipath flow allocation in anonymous wireless networks with dependent sources. Allerton Conference 2012: 1395-1400 - [c10]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Leader selection in multi-agent systems for smooth convergence via fast mixing. CDC 2012: 818-824 - [c9]Chouchang Yang, Basel Alomair, Radha Poovendran:
Optimized flow allocation for anonymous communication in multipath wireless networks. ISIT 2012: 219-223 - 2011
- [j4]Basel Alomair, Loukas Lazos, Radha Poovendran:
Securing low-cost RFID systems: An unconditionally secure approach. J. Comput. Secur. 19(2): 229-257 (2011) - 2010
- [j3]Basel Alomair, Radha Poovendran:
Privacy versus scalability in radio frequency identification systems. Comput. Commun. 33(18): 2155-2163 (2010) - [j2]Basel Alomair, Andrew Clark, Radha Poovendran:
The power of primes: security of authentication based on a universal hash-function family. J. Math. Cryptol. 4(2): 121-148 (2010) - [c8]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Scalable RFID systems: a privacy-preserving protocol with constant-time identification. DSN 2010: 1-10 - [c7]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Statistical Framework for Source Anonymity in Sensor Networks. GLOBECOM 2010: 1-6 - [c6]Basel Alomair, Radha Poovendran:
Efficient Authentication for Mobile and Pervasive Computing. ICICS 2010: 186-202 - [c5]Basel Alomair, Radha Poovendran:
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels. ICISC 2010: 292-310
2000 – 2009
- 2009
- [j1]Basel Alomair, Radha Poovendran:
Information Theoretically Secure Encryption with Almost Free Authentication. J. Univers. Comput. Sci. 15(15): 2937-2956 (2009) - [c4]Basel Alomair, Radha Poovendran:
Unconditionally Secure Authenticated Encryption with Shorter Keys. WOSIS 2009: 5-15 - 2008
- [c3]Basel Alomair, Krishna Sampigethaya, Radha Poovendran:
Efficient Generic Forward-Secure Signatures and Proxy Signatures. EuroPKI 2008: 166-181 - [c2]Basel Alomair, Radha Poovendran:
On the Authentication of RFID Systems with Bitwise Operations. NTMS 2008: 1-6 - 2007
- [c1]Basel Alomair, Loukas Lazos, Radha Poovendran:
Passive Attacks on a Class of Authentication Protocols for RFID. ICISC 2007: 102-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 23:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint