What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Issa Khalil
Google Scholar
ORCID:
0000-0002-7660-9512
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure.
Fatih Deniz
Mohamed Nabeel
Ting Yu
Issa Khalil
2025
conf/esorics
StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models.
Shehel Yoosuf
Temoor Ali
Ahmed Lekssays
Mashael AlSabah
Issa Khalil
2025
conf/uss
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data.
Dorde Popovic
Amin Sadeghi
Ting Yu
Sanjay Chawla
Issa Khalil
2025
conf/uss
LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models.
Ahmed Lekssays
Hamza Mouhcine
Khang Tran
Ting Yu
Issa Khalil
2024
conf/ccs
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs).
Mahmoud Nazzal
Issa Khalil
Abdallah Khreishah
NhatHai Phan
2024
conf/ccs
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code.
Khiem Ton
Nhi Nguyen
Mahmoud Nazzal
Abdallah Khreishah
Cristian Borcea
NhatHai Phan
Ruoming Jin
Issa Khalil
Yelong Shen
2024
conf/uss
Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data.
Saravanan Thirumuruganathan
Fatih Deniz
Issa Khalil
Ting Yu
Mohamed Nabeel
Mourad Ouzzani
2024
conf/sp
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection.
Mahmoud Nazzal
Issa Khalil
Abdallah Khreishah
NhatHai Phan
Yao Ma
2022
conf/sp
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Saravanan Thirumuruganathan
Mohamed Nabeel
Euijin Choo
Issa Khalil
Ting Yu
2022
conf/sp
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
2021
conf/uss
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Ravindu De Silva
Mohamed Nabeel
Charith Elvitigala
Issa Khalil
Ting Yu
Chamath Keppitiyagama
2021
conf/asiaccs
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
2021
conf/dsn
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Lun-Pin Yuan
Euijin Choo
Ting Yu
Issa Khalil
Sencun Zhu
2019
conf/ccs
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Haipei Sun
Xiaokui Xiao
Issa Khalil
Yin Yang
Zhan Qin
Wendy Hui Wang
Ting Yu
2019
conf/sec
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier.
Guanxiong Liu
Issa Khalil
Abdallah Khreishah
2019
conf/dsn
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks.
Guanxiong Liu
Issa Khalil
Abdallah Khreishah
2019
conf/dsn
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense.
Guanxiong Liu
Issa Khalil
Abdallah Khreishah
2017
conf/ccs
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Zhan Qin
Ting Yu
Yin Yang
Issa Khalil
Xiaokui Xiao
Kui Ren
2016
conf/ccs
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected.
Issa Khalil
Zuochao Dou
Abdallah Khreishah
2016
conf/ccs
Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Issa Khalil
Ting Yu
Bei Guan
2016
conf/ccs
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Zhan Qin
Yin Yang
Ting Yu
Issa Khalil
Xiaokui Xiao
Kui Ren
Coauthors
Abdallah Khreishah
(7)
Ahmed Lekssays
(2)
Amin Sadeghi
(1)
Bei Guan
(1)
Chamath Keppitiyagama
(1)
Charith Elvitigala
(1)
Cristian Borcea
(1)
Daniel Woods
(2)
Dorde Popovic
(1)
Euijin Choo
(2)
Fatih Deniz
(2)
Guanxiong Liu
(3)
Haipei Sun
(1)
Hamza Mouhcine
(1)
Issa Khalil
(21)
Khang Tran
(1)
Khiem Ton
(1)
Kui Ren
(2)
Lun-Pin Yuan
(1)
Mahmoud Nazzal
(3)
Mashael AlSabah
(1)
Mohamed Nabeel
(4)
Mourad Ouzzani
(1)
Mustafa Abdallah
(2)
NhatHai Phan
(3)
Nhi Nguyen
(1)
Parinaz Naghizadeh
(2)
Ravindu De Silva
(1)
Ruoming Jin
(1)
Sanjay Chawla
(1)
Saravanan Thirumuruganathan
(2)
Saurabh Bagchi
(2)
Sencun Zhu
(1)
Shehel Yoosuf
(1)
Shreyas Sundaram
(2)
Temoor Ali
(1)
Timothy N. Cason
(2)
Ting Yu
(11)
Wendy Hui Wang
(1)
Xiaokui Xiao
(3)
Yao Ma
(1)
Yelong Shen
(1)
Yin Yang
(3)
Zhan Qin
(3)
Zuochao Dou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to