default search action
Youssef Gahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Rihab Benaich, Saida El Mendili, Youssef Gahi:
Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology. IEEE Access 12: 83183-83204 (2024) - [c26]Abbassi Hanae, Saida El Mendili, Youssef Gahi:
Synergy of Machine Learning and Blockchain Strategies for Transactional Fraud Detection in FinTech Systems. FiCloud 2024: 292-297 - 2023
- [j8]Widad Elouataoui, Saida El Mendili, Youssef Gahi:
Quality Anomaly Detection Using Predictive Techniques: An Extensive Big Data Quality Framework for Reliable Data Analysis. IEEE Access 11: 103306-103318 (2023) - [j7]Widad Elouataoui, Saida El Mendili, Youssef Gahi:
An Automated Big Data Quality Anomaly Correction Framework Using Predictive Analysis. Data 8(12): 182 (2023) - [c25]Widad Elouataoui, Saida El Mendili, Youssef Gahi:
Big Data Quality Anomaly Scoring Framework Using Artificial Intelligence. CiSt 2023: 87-92 - [c24]Abdellah Berkaoui, Youssef Gahi:
Enabling open banking and analytics in the cloud through a distributed data anonymization pipeline. CiSt 2023: 99-104 - [c23]Abbassi Hanae, Youssef Gahi, Saida El Mendili:
Analysis of Banking Fraud Detection Methods through Machine Learning Strategies in the Era of Digital Transactions. CiSt 2023: 105-110 - [c22]Chaymae Majdoubi, Saida El Mendili, Youssef Gahi:
Data Security Patterns for Critical Big Data Systems. CloudTech 2023: 1-8 - [c21]Abdellah Berkaoui, Youssef Gahi:
High Availabale Hadoop Deployment Modes with Enterprise-Level capabilities. FiCloud 2023: 26-32 - [c20]Widad Elouataoui, Saida El Mendili, Youssef Gahi:
Online Continual Learning Data Quality Framework for Entity Resolution. FiCloud 2023: 217-222 - [c19]Abdellah Berkaoui, Youssef Gahi:
A private cloud-based Datalab for scalable DSML pipelines. NISS 2023: 22:1-22:7 - 2022
- [j6]Widad Elouataoui, Imane El Alaoui, Saida El Mendili, Youssef Gahi:
An Advanced Big Data Quality Framework Based on Weighted Metrics. Big Data Cogn. Comput. 6(4): 153 (2022) - 2021
- [c18]Hamid Hajaje, Zine El Abidine Guennoun, Mounib Khanafer, Youssef Gahi, Junaid Israr, Mouhcine Guennoun:
CPC-H2: Convolution Power-based Cryptosystem and Digital Signature. CCECE 2021: 1-7 - 2020
- [j5]Abou Zakaria Faroukhi, Imane El Alaoui, Youssef Gahi, Aouatif Amine:
An Adaptable Big Data Value Chain Framework for End-to-End Big Data Monetization. Big Data Cogn. Comput. 4(4): 34 (2020) - [j4]Abou Zakaria Faroukhi, Imane El Alaoui, Youssef Gahi, Aouatif Amine:
Big data monetization throughout Big Data Value Chain: a comprehensive review. J. Big Data 7(1): 3 (2020) - [c17]Imane El Alaoui, Youssef Gahi:
Network Security Strategies in Big Data Context. FNC/MobiSPC 2020: 730-736 - [c16]Abou Zakaria Faroukhi, Imane El Alaoui, Youssef Gahi, Aouatif Amine:
A Multi-Layer Big Data Value Chain Approach for Security Issues. FNC/MobiSPC 2020: 737-744 - [c15]Abou Zakaria Faroukhi, Imane El Alaoui, Youssef Gahi, Aouatif Amine:
Big Data Value Chain: A Unified Approach for Integrated Data Quality and Security. ICECOCS 2020: 1-8
2010 – 2019
- 2019
- [j3]Imane El Alaoui, Youssef Gahi, Rochdi Messoussi, Youness Chaabi, Alexis Todoskoff, Abdessamad Kobi:
Correction to: A novel adaptable approach for sentiment analysis on big social data. J. Big Data 6: 76 (2019) - [c14]Imane El Alaoui, Youssef Gahi:
The Impact of Big Data Quality on Sentiment Analysis Approaches. EUSPN/ICTH 2019: 803-810 - [c13]Youssef Gahi, Imane El Alaoui:
A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy. EUSPN/ICTH 2019: 811-818 - 2018
- [j2]Imane El Alaoui, Youssef Gahi, Rochdi Messoussi, Youness Chaabi, Alexis Todoskoff, Abdessamad Kobi:
A novel adaptable approach for sentiment analysis on big social data. J. Big Data 5: 12 (2018) - 2017
- [c12]Imane El Alaoui, Youssef Gahi, Rochdi Messoussi, Alexis Todoskoff, Abdessamad Kobi:
Big Data Analytics: A Comparison of Tools and Applications. SCA 2017: 587-601 - 2016
- [c11]Yacine Ichibane, Zouhair Guennoun, Youssef Gahi, Mouhcine Guennoun:
Blind forwarding for secure and private communications in untrusted networks. CCECE 2016: 1-4 - [c10]Junaid Israr, Youssef Gahi, Mouhcine Guennoun, Hussein T. Mouftah:
Security analysis of C-BGP: A light alternative to S-BGP. CCECE 2016: 1-6 - [c9]Youssef Gahi, Junaid Israr, Mouhcine Guennoun:
Wormhole Detection in Secured BGP Networks. CSCloud 2016: 7-11 - [c8]Mounib Khanafer, Youssef Gahi, Mouhcine Guennoun, Hussein T. Mouftah:
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks. CSCloud 2016: 95-101 - [c7]Youssef Gahi, Mouhcine Guennoun, Hussein T. Mouftah:
Big Data Analytics: Security and privacy challenges. ISCC 2016: 952-957 - [c6]Youssef Gahi, Farid Bourennani, Mouhcine Guennoun, Hussein T. Mouftah:
Blind decryption for cloud computing. ISCC 2016: 1053-1057 - 2015
- [c5]Yacine Ichibane, Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun:
Performance analysis of private information retrieval scheme based on homomorphic encryption. ICTA 2015: 1-6 - [i4]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols. CoRR abs/1508.05411 (2015) - [i3]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
An Encrypted Trust-Based Routing Protocol. CoRR abs/1512.03280 (2015) - [i2]Youssef Gahi, Mouhcine Guennoun, Khalil El-Khatib:
A Secure Database System using Homomorphic Encryption Schemes. CoRR abs/1512.03498 (2015) - 2014
- [c4]Yacine Ichibane, Youssef Gahi, Zouhair Guennoun, Mouhcine Guennoun:
Private Video Streaming Service Using Leveled Somewhat Homomorphic Encryption. SITIS 2014: 209-214 - 2013
- [i1]Youssef Gahi, Meryem Lamrani, Mouhcine Guennoun, Khalil El-Khatib:
Infrastructure Logicielle d un Environnement Hospitalier Intelligent. CoRR abs/1311.3231 (2013) - 2012
- [j1]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
Privacy Preserving Scheme for Location-Based Services. J. Information Security 3(2): 105-112 (2012) - [c3]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
A fully private video on-Demand service. CCECE 2012: 1-4 - 2011
- [c2]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
Encrypted processes for oblivious data retrieval. ICITST 2011: 514-518
2000 – 2009
- 2008
- [c1]Youssef Gahi, Meryem Lamrani, Abdelhak Zoglat, Mouhcine Guennoun, Bill Kapralos, Khalil El-Khatib:
Biometric Identification System Based on Electrocardiogram Data. NTMS 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint