A survey of clustering algorithms for big data: Taxonomy and empirical analysis A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ... IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014 | 1280 | 2014 |
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living ARM Forkan, I Khalil, Z Tari, S Foufou, A Bouras Pattern Recognition 48 (3), 628-641, 2015 | 247 | 2015 |
Local differential privacy for deep learning PCM Arachchige, P Bertok, I Khalil, D Liu, S Camtepe, M Atiquzzaman IEEE Internet of Things Journal 7 (7), 5827-5842, 2019 | 246 | 2019 |
CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living A Forkan, I Khalil, Z Tari Future Generation Computer Systems 35, 114-127, 2014 | 218 | 2014 |
A trustworthy privacy preserving framework for machine learning in industrial IoT systems PCM Arachchige, P Bertok, I Khalil, D Liu, S Camtepe, M Atiquzzaman IEEE Transactions on Industrial Informatics 16 (9), 6092-6102, 2020 | 212 | 2020 |
Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems A Ibaida, I Khalil IEEE Transactions on biomedical engineering 60 (12), 3322-3330, 2013 | 206 | 2013 |
Diagnosis of cardiovascular abnormalities from compressed ECG: a data mining-based approach F Sufi, I Khalil IEEE transactions on information technology in biomedicine 15 (1), 33-39, 2010 | 170 | 2010 |
BDCaM: Big data for context-aware monitoring—A personalized knowledge discovery framework for assisted healthcare ARM Forkan, I Khalil, A Ibaida, Z Tari IEEE transactions on cloud computing 5 (4), 628-641, 2015 | 163 | 2015 |
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems A Almalawi, X Yu, Z Tari, A Fahad, I Khalil Computers & Security 46, 94-110, 2014 | 155 | 2014 |
An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems M Keshk, E Sitnikova, N Moustafa, J Hu, I Khalil IEEE Transactions on Sustainable Computing 6 (1), 66-79, 2019 | 149 | 2019 |
Privacy preserving face recognition utilizing differential privacy MAP Chamikara, P Bertók, I Khalil, D Liu, S Camtepe Computers & Security 97, 101951, 2020 | 119 | 2020 |
Efficient privacy preservation of big data for accurate data mining MAP Chamikara, P Bertok, D Liu, S Camtepe, I Khalil Information Sciences 527, 420-443, 2020 | 116 | 2020 |
Toward an efficient and scalable feature selection approach for internet traffic classification A Fahad, Z Tari, I Khalil, I Habib, H Alnuweiri Computer Networks 57 (9), 2040-2057, 2013 | 116 | 2013 |
Novel methods of faster cardiovascular diagnosis in wireless telecardiology F Sufi, Q Fang, I Khalil, SS Mahmoud IEEE Journal on Selected Areas in Communications 27 (4), 537-552, 2009 | 113 | 2009 |
Secure edge of things for smart healthcare surveillance framework A Alabdulatif, I Khalil, X Yi, M Guizani IEEE access 7, 31010-31021, 2019 | 112 | 2019 |
Security and privacy in cloud computing: vision, trends, and challenges Z Tari, X Yi, US Premarathne, P Bertok, I Khalil IEEE Cloud Computing 2 (2), 30-38, 2015 | 110 | 2015 |
Privacy preserving distributed machine learning with federated learning MAP Chamikara, P Bertok, I Khalil, D Liu, S Camtepe Computer Communications 171, 112-125, 2021 | 107 | 2021 |
A practical privacy-preserving recommender system S Badsha, X Yi, I Khalil Data Science and Engineering 1, 161-177, 2016 | 107 | 2016 |
Towards secure and practical consensus for blockchain based VANET S Kudva, S Badsha, S Sengupta, I Khalil, A Zomaya Information Sciences 545, 170-187, 2021 | 103 | 2021 |
ECG-based authentication F Sufi, I Khalil, J Hu Handbook of information and communication security, 309-331, 2010 | 99 | 2010 |