Dr. Ali Chehab

Dr. Ali Chehab

Ali Chehab is a Professor and Chair of the ECE Department at AUB. His research advances trustworthy AI, cybersecurity, and intelligent cloud-edge architectures, with significant contributions to AI-driven healthcare systems, including medical imaging analytics, predictive modeling, and privacy-aware clinical AI solutions. His work integrates machine learning, system resilience, and data governance to ensure that healthcare AI systems are accurate, secure, and deployable in real-world environments. He has led funded research projects and supervised graduate research at the intersection of AI, Medicine, and Cybersecurity.

“Top 2% Most-Cited Scientists Worldwide”

Elsevier, 2025
0
Journal Articles
0
Conference Papers
0
Book Chapters
0
Total Publications
0
Citations

Last updated: February 23, 2026

Awards & Recognitions

Special Recognition and Mention of Leadership in Cyber Security Research Quality and Impact in the Arab Region
Communications of the ACM · 2021
Excellent Paper Award
International Conference on AI in Information and Communication (ICAIIC)
February 18-21, 2025
Best Paper Award
International Conference on Wireless Networks and Mobile Systems (WINSYS)
July 8-10, 2020
Best Paper Award
15th International Wireless Communications & Mobile Computing Conference (IWCMC) (Tangier, Morocco)
June 24-28, 2019
Best Paper Award
IEEE International Conference on Fog and Edge Mobile Computing (FMEC) (Valencia, Spain)
May 8-11, 2017
Best Paper Award
International Symposium on Quality Electronic Design (ISQED) (Santa Clara, CA, USA)
March 3-5, 2014

Service & Associations

Professional Associations

  • Senior Member, IEEE
  • Senior Member, Association for Computing Machinery (ACM)
  • Member, IEEE Computer Society
  • Member, Order of Engineers, Beirut, Lebanon

Conference Organization

  • Promotion & Tenure Review
    ECE Department - Rochester Institute of Technology (Dec. 2024)
  • Co-Chair
    IoT & Sensor Networks Symposium, ICC 2021
  • General Co-Chair
    Fifth IEEE International Conference on Software Defined Systems (SDS-2018)
  • Co-Chair
    Reputation, Evidence and other Collaboration Know-How (TRECK 2014)
  • Track Chair
    Mobile & Cloud Computing, ICCIT 2013

Journal Reviews

  • Journal of Network and Computer Applications
    Years: 2019, 2018
  • IEEE Access
    Years: 2019
  • Journal of Computer Networks
    Years: 2019
  • Jordanian Journal of Computers and Information Technology
    Years: 2019
  • Future Generation Computer Systems
    Years: 2019
  • International Journal of Communication Systems
    Years: 2019
  • IEEE Transactions on VLSI
    Years: 2012, 2015, 2016
  • Applied Mathematical Modelling (Elsevier)
    Years: 2012
  • IEEE Transactions on Dependable and Secure Computing
    Years: 2011
  • International Journal of Network Security
    Years: 2005, 2006, 2008, 2009, 2010
  • IEEE Transactions on Intelligent Transportation Systems
    Years: 2008
  • Electronics Letters
    Years: 2007, 2008
  • IEEE Transactions on Circuits and Systems II
    Years: 2007
  • IEE Proceedings - Circuits, Devices and Systems
    Years: 2007
  • Journal of Electronic Testing: Theory and Applications (JETTA)
    Years: 2005
  • International Journal on Education
    Years: 2003
  • International Journal on Engineering Education
    Years: 2003

Book Reviews

  • Thermal Aware Testing of Digital VLSI Circuits and Systems
    Publisher: CRC Press
    Date: 2017
  • Book Proposal on C#
    Authors: Bell and Parr
    Publisher: Pearson Education
    Date: September 2002

Technical Program Committee Member

WINSYS 2020 SDS 2021 SDS 2020 SDS 2019 TRECK 2016 TRECK 2015 ICC 2014 ICC 2012 ICC 2011 ICC 2010 ICC 2009 MELECON 2014 IDT 2006-2014 IWCMC 2013 IWCMC 2011 IWCMC 2010 IIT 2013 IIT 2008 IIT 2007 IIT 2006 IIT 2005 IIT 2004 GLOBECOM 2012 GLOBECOM 2009 GLOBECOM 2008 ICT 2012 ICECS 2011 ICECS 2008 ICECS 2006 MIC-CCA 2008 DTIS 2009 M-WCMC 2007

Conference Paper Reviews

ICITST 2011 ACC 2011 ICP 2009 SETIT 2009 CAT 2008 SAC 2008 Prime 2007

Research Supervision

20 Phd Students

Current
Fatima Fneich
AI for Medicine
Current
Ahmad Mustapha
AI for Imaging
Current
Fatima Nasser
AI for Medicine
Current
Hadi Hassan
AI for Medicine
Current
Razan El Mais
Privacy & Security
Dec. 2025
Fouad Trad
From Traditional ML to LLMs for Advancing Cybersecurity in Dynamic Environments
Feb. 2025
Ahmad Sattout
Defense Mechanisms for Mitigating Adversarial Attacks Against Deep Learning-Based Traffic Signs Recognition of Autonomous Driving Cars
April 2021
Louma Chaddad
Thwarting Traffic Classification for Privacy Preservation
Oct. 2020
Basma Hajri
Design and Optimization of Low-Power Embedded Resistive Memory (RRAM)
Aug. 2020
Reem Melki
Designing Physical Layer Security Solutions for Emerging Communication Systems in 5G Networks
July 2020
Asmaa Abdallah
Interference Mitigation in 5G Network Densification Technologies: Algorithms and Performance limits
July 2020
Saleh Usman
Optimized ASIC Accelerator Chips for LDPC Decoders by Joint Algorithm, Architecture, and Circuit Co-Design
Feb. 2020
Ola Salman
Machine Learning for Internet Traffic Classification
Jan. 2020
Ali Hussein
Machine Learning for Network Resilience
Jan. 2020
Sarah Abdallah
On Centralized and Distributed Control of Communication Networks
Sep. 2018
Farah Saab
Crowdsourcing for Mobile Security: Modelling, Psychological Bias, and Performance of Aggregation Methods
July 2018
Maha Shamseddine
Service Provisioning in Virtualized and Programmable Network Environments
March 2018
Hadi Sarieddine
Large Multiuser MIMO Detection: Algorithms and Architectures
Feb. 2015
Ayman Tajeddine
Reputation-Based Trust Model for Secure Routing in Wireless Sensor Networks
Feb. 2012
Wassim Itani
Challenges and Solutions for Security and Service Collaboration in the Cloud

66 Master Students

Current
Ali Jaafar
AI for Cybersecurity
Current
Mohamad Zahwe
AI for Imaging
Current
Ayman Kanso
AI for Cybersecurity
Current
Mariam Obeid (USJ)
AI for Cybersecurity
Current
Zahraa Hussein (CS)
Self-Healing Cloud and Edge Devices
Current
Zeina Eldika
AI for Medicine
Current
Noha Faour
AI for Medicine
Current
Jihad Katerji
AI for Medicine
Current
Ola Sadek
AI for Medicine
Current
Anthony Saab
AI for Cybersecurity
Current
Ali Sahili
AI Security
Current
Nour El Khatib
AI for Medicine
Current
Nour Fakih
Hardware Security
Current
Zeina Kojok
AI for Medicine
2025
Silvana Yakhni
Bridging Cultures: Harnessing Large Language Models for Translation of Lebanese Dialect
2024
Fatima Nasser
Accelerating Umbrella Reviews Via Natural Language Processing
2024
Ali Moustafa
ML for Analyzing Logs of Security Operating Center
2024
Ibrahim El-Didi
Enhancing Network Security Through Deep Learning
2024
Hussein Fardoun
Enhancing AI-Based Intrusion Detection via Generative Adversarial Networks
2023
Rim Cherri
Utilizing Transfer Learning for Vertebral Fractures Detection
2022
Hadi Abdel Ghani
Artificial Intelligence for Security of IoT Devices
2021
Hussein Kaheel
AI-Based Medical Image Analysis for Early COVID-19 Detection
2020
Mahdi Chehimi
Physical Layer for Combating Jammers and Eavesdroppers
2020
Iman Dernayka
Blockchain Development Platforms: Performance Comparison
2020
Ramzi Sabra
Robustness Guided Verification
2017
Georgi Ajaeiya
Network Traffic Classification and Novelty Detection for Mobile Apps
2017
Serove Awedikian
Hardware Design and Implementation of Elliptic Curve Cryptography
2016
Nareg Adalian
IPSEC Scalability: Network Design
2016
Riwa Mouawi
Assessment of In-app Ads Security Vulnerabilities and Resource Consumption
2016
Hrant Sulahian
A Smart Resource Allocation Algorithm for D2D Communications in Cellular Networks
2016
Vahe Seferian
An Identity Based Security Framework for Advanced Metering Infrastructure
2015
Joseph Loutfi
Modeling Diameter Protocol in LTE Environment
2015
Khaled Bakhit
Dagger: Distributed Architecture for Granular Mitigation of Mobile Based Attacks
2014
Louma Chaddad
Data Center Design with Autonomic Power-Aware Workload Allocation
2014
Lama Shaer
Optimal VLSI Architecture for 2x2 MIMO Detector
2014
Sarah Abdallah
Low Power Stochastic SIMD Hardware for Error Tolerant Applications
2013
Imad Sargi
The Effects of Smartphones Signaling on LTE Backbone
2013
Farah Saab
Energy Efficient Motion Estimation Using Stochastic Processing for Video Conferencing Applications
2013
Naoum Sayegh
SCADA Vulnerability Assessment and Attacks Detection
2013
Khodor Hamandi
Application-Based User and Telecom Targeted Attacks on Android-Based Smartphones: Applicability, Detection and Mitigation
2013
Alain Haddad
MEMS Sensor for Low Frequency Vibration Detection
2012
Salwa Adriana Saab
Secure Mobile Application Partitioning In Energy-Efficient Cloud Computing
2012
Alaa Atassi
Intrusion detection for SCADA and BMS
2012
Ramzi Bassil
The Effects of Signaling and Resource Reservation Attacks on LTE Networks
2012
Faisal Hamady
Scalable low power computing via scheduling on subsets of multicore processors
2010
Soulaf Saab
Delay-Tolerant Networks: Secure Communications in The Presence of Oppressive Governments
2010
Cesar Ghali
CATRAC: A Context Aware Trust-based and Role-based Access Control for Composite Web Services
2010
Saleem Wehbe
Security and Privacy for Low-Cost RFID Tags
2009
Mounira Sayour
Secure_Script: A Client and Server Collaborative System to Protect against JavaScript-Based Attacks
2008
Hoda Daou
RFID Security Protocols
2008
Rima Deghaili
Trust-Privacy Tradeoffs in Distributed Computing
2008
Batoul Haidar
Host Protection in Grid Computing
2007
Zein Radwan
XPRIDE Firewall: Policy-Driven Content-Based Web Services Firewall
2007
Layla Khoury
Implementing and Evaluating an Authentication Mechanism and Key Agreement Protocol for SIP that Uses Identity-based Cryptography
2007
Lara Srour
Security, Personalization and Trust in Distributed File Sharing Networks and Centralized Search Engines
2006
Camille Gaspard
PRIDE – Policy-Driven WEB Security for Handheld Wireless Devices
2005
Anis Nazer
Evaluation of Dynamic Current Testing for CMOS Domino Circuits
2005
Mohamad Eid
ADMIDS - Adaptive and Defense Mobile Agent Based Intrusion Detection System
2005
Alaa Dalghan
WISEC: VPN over WLAN 802.11. Design and Implementation of a Secure Virtual Wireless Environment
2005
Yasser Shaer
Secure Range Extensions in IEEE 802.11i
2005
Rania Wehbe
SERVEN: Secure Routing and Protection of Security Mechanisms in Inter-Vehicle Communication (IVC) Networks
2005
Ruba Kaissi
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks
2005
Elias Nahra
TRUMMAR Optimization and Implementation on Wide Scale Networks
2005
Ayman Tajeddine
PATROL-F – A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems
2004
Samer Hanna
Lighter Weight Mobile Agent System
2004
Ghada Derbas
TRUMMAR - A Trust Model for Mobile Agent Systems based on Reputation