Abdallah Khreishah
Professor, Electrical and Computer Engineering
ECEC 349
About Me
Abdallah Khreishah received his Ph.D and M.S. degrees in Electrical and Computer Engineering from Purdue University in 2010 and 2006, respectively. Prior to that, he received his B.S. degree with honors from Jordan University of Science & Technology in 2004. During the last year of his Ph.D, he worked with NEESCOM. In Fall 2012, he joined the ECE department of NJIT where he is currently an Associate Professor. Abdallah is an active researcher. His research spans the areas of visible-light communications, network coding, wireless networks, congestion control, cloud computing, network security, intellegent transportation sysytems, and database systems for large projects. His research projects are funded by the National Science Foundation (NSF), New Jersey Department of Transportation (NJDOT), and the UAE Research Foundation.
Education
Ph.D. ; Purdue University-Main Campus ; Electrical And Computer Engineering ; 2010

M.S. ; Purdue University-Main Campus ; Electrical And Computer Engineering ; 2006

B.S. ; Jordan University of Science & Technology ; Computer Engineering ; 2004

2025 Fall Courses
ECE 792B - PRE-DOCTORAL RESEARCH

ECE 683 - CLOUD IOT NETWORK & SECURITY

ECE 725 - INDEPENDENT STUDY I

ECE 790A - DOCTRL DISSRTN & RESEARCH

ECE 700B - MASTER'S PROJECT

Teaching Interests
Computer architecture, computer networks, optimization for communication networks.
Past Courses
ECE 353: COMPUTER ARCH & ORGANIZATION

ECE 636: COMPUTER NETWORKING LABORATORY

ECE 673: RANDOM SIGNAL ANALYSIS I

ECE 683: CLOUD AND IOT NETWORKING AND SECURITY

ECE 683: COMP NETWRK DESGN & ANALYS

ECE 683: COMPUTER NETWORK DESIGN AND ANALYSIS

ECE 698: ST: LLM ENGINEERING AND APPLICATIONS

ECE 744: OPTIMIZATION FOR COMM NETWORKS

ECE 744: OPTIMIZATION FOR COMMUNICATION NETWORKS

ECE 744: OPTIMIZATION FOR DATA ENGINEERING

Research Interests
Visible-light communication, Adversarial examples, Machine Learning, wireless networks, congestion control, cloud and edge computing, datacenter networks, network security.
Journal Article
Shakhatreh, Hazim,, H. Sawalmeh Ahmad.. ""Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, and Mohsen Guizani." Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges."."." Ieee Access 7 (2019): 48572-48634. .

Shakhatreh, Hazim,, H. Sawalmeh Ahmad.. ""Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, and Mohsen Guizani." Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges."."." Ieee Access 7 (2019): 48572-48634. .

Abdallah Khreishah, Ness B Shroff, Chih-chun Wang. "Abstract/Details." .

Abdallah Khreishah, Ann Arbor, Ness B Shroff, Chih-chun Wang. "Abstract/Details." .

Abdallah Khreishah. "Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, and Mohsen Guizani." Unmanned aerial vehicles." .

SHOW MORE
Other
"Unmanned aerial vehicles: A survey on civil applications and key research challenges. arXiv 2018"
.

"Unmanned aerial vehicles: A survey on civil applications and key research challenges. arXiv 2018"
.

"Unmanned aerial vehicles: A survey on civil applications and key research challenges. arXiv 2018"
.

"Wireless algorithms, systems, and applications"
Springer, Boston, 2017.

"Wireless Algorithms, Systems, and Applications: 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings"
Springer, 2017.

SHOW MORE
Conference Paper
"How to Backdoor HyperNetwork in Personalized Federated Learning?"
NeurIPS 2023 - Backdoor in Deep Learning, December, 2023.

"Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks"
IEEE BigData 2022, December, 2022.

"Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness"
The 9th IEEE International Conference on Software Defined Systems (IEEE SDS-2022), December, 2022.

"A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples"
December, 2021.

Conference Proceeding
"Federated Learning Aided Deep Convolutional Neural Network Solution for Smart Traffic Management"
2023.

"Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification"
2023.

"How to Backdoor HyperNetwork in Personalized Federated Learning?"
2023.

"Ima-gnn: In-memory acceleration of centralized and decentralized graph neural networks at the edge"
2023.

"IMA-GNN: In-Memory Acceleration of Centralized and Decentralized Graph Neural Networks at the Edge"
2023.

SHOW MORE
Chapter
Pouya Ostovari, Jie Wu, Abdallah Khreishah. "Network coding techniques for wireless and sensor networks." pp. 129–162. Springer Berlin Heidelberg, 2014.

Pouya Ostovari, Jie Wu, Abdallah Khreishah. "Network coding techniques for wireless and sensor networks." pp. 129--162. Springer, Berlin, Heidelberg, 2014.

Pouya Ostovari, Jie Wu, Abdallah Khreishah. "Network coding techniques for wireless and sensor networks." pp. 129--162. Springer, Berlin, Heidelberg, 2014.

Pouya Ostovari, Jie Wu, Abdallah Khreishah. "Network coding techniques for wireless and sensor networks." "The art of wireless sensor networks," pp. 129--162. Springer, Berlin, Heidelberg, 2014.

Pouya Ostovari, Jie Wu, Abdallah Khreishah. "Network coding techniques for wireless and sensor networks." "The art of wireless sensor networks," pp. 129--162. Springer, Berlin, Heidelberg, 2014.