Dr. Ali Chehab
Ali Chehab is a Professor and Chair of the ECE Department at AUB. His research advances trustworthy AI, cybersecurity, and intelligent cloud-edge architectures, with significant contributions to AI-driven healthcare systems, including medical imaging analytics, predictive modeling, and privacy-aware clinical AI solutions. His work integrates machine learning, system resilience, and data governance to ensure that healthcare AI systems are accurate, secure, and deployable in real-world environments. He has led funded research projects and supervised graduate research at the intersection of AI, Medicine, and Cybersecurity.
“Top 2% Most-Cited Scientists Worldwide”
— Elsevier, 20250
Journal Articles
0
Conference Papers
0
Book Chapters
0
Total Publications
0
Citations
Last updated: February 23, 2026
Awards & Recognitions
Special Recognition and Mention of Leadership in Cyber Security Research Quality and Impact in the Arab Region
Communications of the ACM · 2021
Excellent Paper Award
International Conference on AI in Information and Communication (ICAIIC)
February 18-21, 2025
February 18-21, 2025
Best Paper Award
International Conference on Wireless Networks and Mobile Systems (WINSYS)
July 8-10, 2020
July 8-10, 2020
Best Paper Award
15th International Wireless Communications & Mobile Computing Conference (IWCMC)
(Tangier, Morocco)
June 24-28, 2019
June 24-28, 2019
Best Paper Award
IEEE International Conference on Fog and Edge Mobile Computing (FMEC)
(Valencia, Spain)
May 8-11, 2017
May 8-11, 2017
Best Paper Award
International Symposium on Quality Electronic Design (ISQED)
(Santa Clara, CA, USA)
March 3-5, 2014
March 3-5, 2014
Service & Associations
Professional Associations
- Senior Member, IEEE
- Senior Member, Association for Computing Machinery (ACM)
- Member, IEEE Computer Society
- Member, Order of Engineers, Beirut, Lebanon
Conference Organization
-
Promotion & Tenure Review
ECE Department - Rochester Institute of Technology (Dec. 2024) -
Co-Chair
IoT & Sensor Networks Symposium, ICC 2021 -
General Co-Chair
Fifth IEEE International Conference on Software Defined Systems (SDS-2018) -
Co-Chair
Reputation, Evidence and other Collaboration Know-How (TRECK 2014) -
Track Chair
Mobile & Cloud Computing, ICCIT 2013
Journal Reviews
-
Journal of Network and Computer Applications
Years: 2019, 2018 -
IEEE Access
Years: 2019 -
Journal of Computer Networks
Years: 2019 -
Jordanian Journal of Computers and Information Technology
Years: 2019 -
Future Generation Computer Systems
Years: 2019 -
International Journal of Communication Systems
Years: 2019 -
IEEE Transactions on VLSI
Years: 2012, 2015, 2016 -
Applied Mathematical Modelling (Elsevier)
Years: 2012 -
IEEE Transactions on Dependable and Secure Computing
Years: 2011 -
International Journal of Network Security
Years: 2005, 2006, 2008, 2009, 2010 -
IEEE Transactions on Intelligent Transportation Systems
Years: 2008 -
Electronics Letters
Years: 2007, 2008 -
IEEE Transactions on Circuits and Systems II
Years: 2007 -
IEE Proceedings - Circuits, Devices and Systems
Years: 2007 -
Journal of Electronic Testing: Theory and Applications (JETTA)
Years: 2005 -
International Journal on Education
Years: 2003 -
International Journal on Engineering Education
Years: 2003
Book Reviews
-
Thermal Aware Testing of Digital VLSI Circuits and Systems
Publisher: CRC Press
Date: 2017 -
Book Proposal on C#
Authors: Bell and Parr
Publisher: Pearson Education
Date: September 2002
Technical Program Committee Member
WINSYS 2020
SDS 2021
SDS 2020
SDS 2019
TRECK 2016
TRECK 2015
ICC 2014
ICC 2012
ICC 2011
ICC 2010
ICC 2009
MELECON 2014
IDT 2006-2014
IWCMC 2013
IWCMC 2011
IWCMC 2010
IIT 2013
IIT 2008
IIT 2007
IIT 2006
IIT 2005
IIT 2004
GLOBECOM 2012
GLOBECOM 2009
GLOBECOM 2008
ICT 2012
ICECS 2011
ICECS 2008
ICECS 2006
MIC-CCA 2008
DTIS 2009
M-WCMC 2007
Conference Paper Reviews
ICITST 2011
ACC 2011
ICP 2009
SETIT 2009
CAT 2008
SAC 2008
Prime 2007
Research Supervision
20 Phd Students
Current
Fatima Fneich
AI for Medicine
Current
Ahmad Mustapha
AI for Imaging
Current
Fatima Nasser
AI for Medicine
Current
Hadi Hassan
AI for Medicine
Current
Razan El Mais
Privacy & Security
Dec. 2025
Fouad Trad
From Traditional ML to LLMs for Advancing Cybersecurity in Dynamic Environments
Feb. 2025
Ahmad Sattout
Defense Mechanisms for Mitigating Adversarial Attacks Against Deep Learning-Based Traffic Signs Recognition of Autonomous Driving Cars
April 2021
Louma Chaddad
Thwarting Traffic Classification for Privacy Preservation
Oct. 2020
Basma Hajri
Design and Optimization of Low-Power Embedded Resistive Memory (RRAM)
Aug. 2020
Reem Melki
Designing Physical Layer Security Solutions for Emerging Communication Systems in 5G Networks
July 2020
Asmaa Abdallah
Interference Mitigation in 5G Network Densification Technologies: Algorithms and Performance limits
July 2020
Saleh Usman
Optimized ASIC Accelerator Chips for LDPC Decoders by Joint Algorithm, Architecture, and Circuit Co-Design
Feb. 2020
Ola Salman
Machine Learning for Internet Traffic Classification
Jan. 2020
Ali Hussein
Machine Learning for Network Resilience
Jan. 2020
Sarah Abdallah
On Centralized and Distributed Control of Communication Networks
Sep. 2018
Farah Saab
Crowdsourcing for Mobile Security: Modelling, Psychological Bias, and Performance of Aggregation Methods
July 2018
Maha Shamseddine
Service Provisioning in Virtualized and Programmable Network Environments
March 2018
Hadi Sarieddine
Large Multiuser MIMO Detection: Algorithms and Architectures
Feb. 2015
Ayman Tajeddine
Reputation-Based Trust Model for Secure Routing in Wireless Sensor Networks
Feb. 2012
Wassim Itani
Challenges and Solutions for Security and Service Collaboration in the Cloud
66 Master Students
Current
Ali Jaafar
AI for Cybersecurity
Current
Mohamad Zahwe
AI for Imaging
Current
Ayman Kanso
AI for Cybersecurity
Current
Mariam Obeid (USJ)
AI for Cybersecurity
Current
Zahraa Hussein (CS)
Self-Healing Cloud and Edge Devices
Current
Zeina Eldika
AI for Medicine
Current
Noha Faour
AI for Medicine
Current
Jihad Katerji
AI for Medicine
Current
Ola Sadek
AI for Medicine
Current
Anthony Saab
AI for Cybersecurity
Current
Ali Sahili
AI Security
Current
Nour El Khatib
AI for Medicine
Current
Nour Fakih
Hardware Security
Current
Zeina Kojok
AI for Medicine
2025
Silvana Yakhni
Bridging Cultures: Harnessing Large Language Models for Translation of Lebanese Dialect
2024
Fatima Nasser
Accelerating Umbrella Reviews Via Natural Language Processing
2024
Ali Moustafa
ML for Analyzing Logs of Security Operating Center
2024
Ibrahim El-Didi
Enhancing Network Security Through Deep Learning
2024
Hussein Fardoun
Enhancing AI-Based Intrusion Detection via Generative Adversarial Networks
2023
Rim Cherri
Utilizing Transfer Learning for Vertebral Fractures Detection
2022
Hadi Abdel Ghani
Artificial Intelligence for Security of IoT Devices
2021
Hussein Kaheel
AI-Based Medical Image Analysis for Early COVID-19 Detection
2020
Mahdi Chehimi
Physical Layer for Combating Jammers and Eavesdroppers
2020
Iman Dernayka
Blockchain Development Platforms: Performance Comparison
2020
Ramzi Sabra
Robustness Guided Verification
2017
Georgi Ajaeiya
Network Traffic Classification and Novelty Detection for Mobile Apps
2017
Serove Awedikian
Hardware Design and Implementation of Elliptic Curve Cryptography
2016
Nareg Adalian
IPSEC Scalability: Network Design
2016
Riwa Mouawi
Assessment of In-app Ads Security Vulnerabilities and Resource Consumption
2016
Hrant Sulahian
A Smart Resource Allocation Algorithm for D2D Communications in Cellular Networks
2016
Vahe Seferian
An Identity Based Security Framework for Advanced Metering Infrastructure
2015
Joseph Loutfi
Modeling Diameter Protocol in LTE Environment
2015
Khaled Bakhit
Dagger: Distributed Architecture for Granular Mitigation of Mobile Based Attacks
2014
Louma Chaddad
Data Center Design with Autonomic Power-Aware Workload Allocation
2014
Lama Shaer
Optimal VLSI Architecture for 2x2 MIMO Detector
2014
Sarah Abdallah
Low Power Stochastic SIMD Hardware for Error Tolerant Applications
2013
Imad Sargi
The Effects of Smartphones Signaling on LTE Backbone
2013
Farah Saab
Energy Efficient Motion Estimation Using Stochastic Processing for Video Conferencing Applications
2013
Naoum Sayegh
SCADA Vulnerability Assessment and Attacks Detection
2013
Khodor Hamandi
Application-Based User and Telecom Targeted Attacks on Android-Based Smartphones: Applicability, Detection and Mitigation
2013
Alain Haddad
MEMS Sensor for Low Frequency Vibration Detection
2012
Salwa Adriana Saab
Secure Mobile Application Partitioning In Energy-Efficient Cloud Computing
2012
Alaa Atassi
Intrusion detection for SCADA and BMS
2012
Ramzi Bassil
The Effects of Signaling and Resource Reservation Attacks on LTE Networks
2012
Faisal Hamady
Scalable low power computing via scheduling on subsets of multicore processors
2010
Soulaf Saab
Delay-Tolerant Networks: Secure Communications in The Presence of Oppressive Governments
2010
Cesar Ghali
CATRAC: A Context Aware Trust-based and Role-based Access Control for Composite Web Services
2010
Saleem Wehbe
Security and Privacy for Low-Cost RFID Tags
2009
Mounira Sayour
Secure_Script: A Client and Server Collaborative System to Protect against JavaScript-Based Attacks
2008
Hoda Daou
RFID Security Protocols
2008
Rima Deghaili
Trust-Privacy Tradeoffs in Distributed Computing
2008
Batoul Haidar
Host Protection in Grid Computing
2007
Zein Radwan
XPRIDE Firewall: Policy-Driven Content-Based Web Services Firewall
2007
Layla Khoury
Implementing and Evaluating an Authentication Mechanism and Key Agreement Protocol for SIP that Uses Identity-based Cryptography
2007
Lara Srour
Security, Personalization and Trust in Distributed File Sharing Networks and Centralized Search Engines
2006
Camille Gaspard
PRIDE – Policy-Driven WEB Security for Handheld Wireless Devices
2005
Anis Nazer
Evaluation of Dynamic Current Testing for CMOS Domino Circuits
2005
Mohamad Eid
ADMIDS - Adaptive and Defense Mobile Agent Based Intrusion Detection System
2005
Alaa Dalghan
WISEC: VPN over WLAN 802.11. Design and Implementation of a Secure Virtual Wireless Environment
2005
Yasser Shaer
Secure Range Extensions in IEEE 802.11i
2005
Rania Wehbe
SERVEN: Secure Routing and Protection of Security Mechanisms in Inter-Vehicle Communication (IVC) Networks
2005
Ruba Kaissi
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks
2005
Elias Nahra
TRUMMAR Optimization and Implementation on Wide Scale Networks
2005
Ayman Tajeddine
PATROL-F – A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems
2004
Samer Hanna
Lighter Weight Mobile Agent System
2004
Ghada Derbas
TRUMMAR - A Trust Model for Mobile Agent Systems based on Reputation