default search action
Adel Abusitta 0001
Person information
- affiliation: Polytechnique Montréal, Department of Computer and Software Engineering, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j10]Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung:
Survey on Explainable AI: Techniques, challenges and open issues. Expert Syst. Appl. 255: 124710 (2024) - 2023
- [j9]Adel Abusitta, Glaucio H. S. Carvalho, Omar Abdel Wahab, Talal Halabi, Benjamin C. M. Fung, Saja Al-Mamoori:
Deep learning-enabled anomaly detection for IoT systems. Internet Things 21: 100656 (2023) - 2022
- [j8]Mohammad Esmaeilpour, Nourhene Chaalia, Adel Abusitta, François-Xavier Devailly, Wissem Maazoun, Patrick Cardinal:
Bi-discriminator GAN for tabular data synthesis. Pattern Recognit. Lett. 159: 204-210 (2022) - 2021
- [j7]Rita Yusri, Adel Abusitta, Esma Aïmeur:
Teens-Online: a Game Theory-Based Collaborative Platform for Privacy Education. Int. J. Artif. Intell. Educ. 31(4): 726-768 (2021) - [j6]Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung:
Malware classification and composition analysis: A survey of recent developments. J. Inf. Secur. Appl. 59: 102828 (2021) - 2019
- [j5]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
Multi-cloud cooperative intrusion detection system: trust and fairness assurance. Ann. des Télécommunications 74(9-10): 637-653 (2019) - [j4]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais, Talal Halabi:
A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Gener. Comput. Syst. 98: 308-318 (2019) - 2018
- [j3]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
On trustworthy federated clouds: A coalitional game approach. Comput. Networks 145: 52-63 (2018) - [j2]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. J. Cloud Comput. 7: 9 (2018) - 2012
- [j1]Adel Hammad Abusitta:
A Visual Cryptography Based Digital Image Copyright Protection. J. Information Security 3(2): 96-104 (2012)
Conference and Workshop Papers
- 2024
- [c11]Mohammadreza Khorramfar, Yaser Al Mtawa, Adel Abusitta, Talal Halabi:
Credit-Based Client Selection for Resilient Model Aggregation in Federated Learning. ICC 2024: 3975-3981 - [c10]Adel Abusitta, Talal Halabi, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments. ICC 2024: 4644-4649 - 2022
- [c9]Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta:
On the Effectiveness of Interpretable Feedforward Neural Network. IJCNN 2022: 1-8 - 2021
- [c8]Adel Abusitta, Omar Abdel Wahab, Benjamin C. M. Fung:
VirtualGAN: Reducing Mode Collapse in Generative Adversarial Networks Using Virtual Mapping. IJCNN 2021: 1-6 - 2020
- [c7]Adel Abusitta, Esma Aïmeur, Omar Abdel Wahab:
Generative Adversarial Networks for Mitigating Biases in Machine Learning Systems. ECAI 2020: 937-944 - [c6]Rita Yusri, Adel Abusitta, Esma Aïmeur:
A Stable Personalised Partner Selection for Collaborative Privacy Education. UMAP (Adjunct Publication) 2020: 47-52 - 2019
- [c5]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game. ICNC 2019: 370-374 - 2018
- [c4]Talal Halabi, Martine Bellaïche, Adel Abusitta:
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment. CSCloud/EdgeCom 2018: 83-88 - [c3]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation. CSNet 2018: 1-8 - [c2]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments. ICIN 2018: 1-8 - [c1]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Online Allocation of Cloud Resources Based on Security Satisfaction. TrustCom/BigDataSE 2018: 379-384
Informal and Other Publications
- 2022
- [i4]Mohammad Esmaeilpour, Nourhene Chaalia, Adel Abusitta, François-Xavier Devailly, Wissem Maazoun, Patrick Cardinal:
RCC-GAN: Regularized Compound Conditional GAN for Large-Scale Tabular Data Synthesis. CoRR abs/2205.11693 (2022) - 2021
- [i3]Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta:
On the Effectiveness of Interpretable Feedforward Neural Network. CoRR abs/2111.02303 (2021) - [i2]Mohammad Esmaeilpour, Nourhene Chaalia, Adel Abusitta, François-Xavier Devailly, Wissem Maazoun, Patrick Cardinal:
Bi-Discriminator Class-Conditional Tabular GAN. CoRR abs/2111.06549 (2021) - 2019
- [i1]Adel Abusitta, Esma Aïmeur, Omar Abdel Wahab:
Generative Adversarial Networks for Mitigating Biases in Machine Learning Systems. CoRR abs/1905.09972 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 01:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint