default search action
Asma Cherif 0001
Person information
- affiliation: King Abdulaziz University, Faculty of Comuting and Information Technology, Jeddah, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Leila Haj Meftah, Asma Cherif, Rafik Braham:
Improving Autonomous Vehicles Maneuverability and Collision Avoidance in Adverse Weather Conditions Using Generative Adversarial Networks. IEEE Access 12: 89679-89690 (2024) - [j16]Sumayya Al-Fadhli, Hajar Al-Harbi, Asma Cherif:
qArI: A Hybrid CTC/Attention-Based Model for Quran Recitation Recognition Using Bidirectional LSTMP in an End-to-End Architecture. IEEE Access 12: 95762-95777 (2024) - [j15]Basmah Al-Zahrani, Asma Cherif, Suhair Alshehri, Abdessamad Imine:
Securing big graph databases: an overview of existing access control techniques. Int. J. Intell. Inf. Database Syst. 16(3): 286-315 (2024) - [j14]Asma Cherif, Heyfa Ammar, Manal Kalkatawi, Suhair Alshehri, Abdessamad Imine:
Encoder-decoder graph neural network for credit card fraud detection. J. King Saud Univ. Comput. Inf. Sci. 36(3): 102003 (2024) - [c16]Mona Alghamdi, Atm Shafiul Alam, Arumugam Nallanathan, Asma Cherif:
Dynamic Clustering-based Task Orchestrator in Mobile Edge Computing. IWCMC 2024: 1613-1618 - [c15]Nusaybah M. Alahdal, Felwa Abukhodair, Leila Haj Meftah, Asma Cherif:
Real-time Object Detection in Autonomous Vehicles with YOLO. KES 2024: 2792-2801 - 2023
- [j13]Mahdi Jemmali, Wadii Boulila, Asma Cherif, Maha Driss:
Efficient Storage Approach for Big Data Analytics: An Iterative-Probabilistic Method for Dynamic Resource Allocation of Big Satellite Images. IEEE Access 11: 91526-91538 (2023) - [j12]Manal M. Alqarni, Asma Cherif, Entisar Alkayyal:
ODM-BCSA: An Offloading Decision-Making Framework based on Binary Cuckoo Search Algorithm for Mobile Edge Computing. Comput. Networks 226: 109647 (2023) - [j11]Asma Cherif, Arwa Badhib, Heyfa Ammar, Suhair Alshehri, Manal Kalkatawi, Abdessamad Imine:
Credit card fraud detection in the era of disruptive technologies: A systematic review. J. King Saud Univ. Comput. Inf. Sci. 35(1): 145-174 (2023) - [c14]Sumayya Al-Fadhli, Hajar Al-Harbi, Asma Cherif:
Towards an End-to-End Speech Recognition Model for Accurate Quranic Recitation. AICCSA 2023: 1-4 - 2022
- [j10]Noha Alsulami, Asma Cherif, Abdessamad Imine:
Collaborative editing over opportunistic networks. Int. J. Ad Hoc Ubiquitous Comput. 39(3): 141-156 (2022) - [c13]Basmah Al-Zahrani, Suhair Alshehri, Asma Cherif, Abdessamad Imine:
Property Graph Access Control Using View-Based and Query-Rewriting Approaches. AICCSA 2022: 1-2 - [c12]Eman T. Alharbi, Asma Cherif, Farrukh Nadeem, Tariq Mirza:
Machine Learning Models for Early Prediction of Asthma Attacks Based on Bio-signals and Environmental Triggers. AICCSA 2022: 1-7 - [c11]Asma Cherif, Suhair Alshehri, Manal Kalkatawi, Abdessamad Imine:
Towards an intelligent adaptive security framework for preventing and detecting credit card fraud. AICCSA 2022: 1-8 - 2021
- [j9]Arwa Badhib, Suhair Alshehri, Asma Cherif:
A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things. IEEE Access 9: 124768-124792 (2021) - [j8]Arwa Badhib, Asma Cherif, Suhair Alshehri:
An overview of continuous device-to-device authentication techniques for the internet of things. Int. J. Ad Hoc Ubiquitous Comput. 36(4): 189-206 (2021) - [j7]Seham Alnefaie, Suhair Alshehri, Asma Cherif:
A survey on access control in IoT: models, architectures and research opportunities. Int. J. Secur. Networks 16(1): 60-76 (2021) - [j6]Manal M. Alqarni, Asma Cherif, Entisar S. Alkayal:
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges. KSII Trans. Internet Inf. Syst. 15(3): 952-973 (2021) - [j5]Seham Alnefaie, Asma Cherif, Suhair Alshehri:
A Distributed Fog-based Access Control Architecture for IoT. KSII Trans. Internet Inf. Syst. 15(12): 4545-4566 (2021) - [j4]Eman T. Alharbi, Farrukh Nadeem, Asma Cherif:
Predictive models for personalized asthma attacks based on patient's biosignals and environmental factors: a systematic review. BMC Medical Informatics Decis. Mak. 21(1): 345 (2021) - [j3]Heyfa Ammar, Asma Cherif:
DeepROD: a deep learning approach for real-time and online detection of a panic behavior in human crowds. Mach. Vis. Appl. 32(3): 57 (2021) - [j2]Mona Alghamdi, Asma Cherif, Abdessamad Imine:
EdgeDoc: An edge-based distributed collaborative editing system. Pervasive Mob. Comput. 70: 101288 (2021) - [c10]Azzah Allahim, Asma Cherif, Abdessamad Imine:
A Hybrid Approach for Optimizing Arabic Semantic Query Expansion. AICCSA 2021: 1-8
2010 – 2019
- 2019
- [c9]Olfa Abusalem, Asma Cherif, Abdessamad Imine:
Towards Optimistic Access Control for Cloud-Based Collaborative Editors. AICCSA 2019: 1-8 - [c8]Mona Al-Ghamdi, Asma Cherif, Abdessamad Imine:
Towards an Edge-Based Architecture for Real-Time Collaborative Editors. AICCSA 2019: 1-8 - 2017
- [c7]Noha Alsulami, Asma Cherif, Abdessamad Imine:
Evaluating data convergence of collaborative editors in opportunistic networks. ICTA 2017: 1-6 - 2016
- [c6]Asma Cherif, Abdessamad Imine:
Using CSP for coordinating undo-based collaborative applications. SAC 2016: 1928-1935 - 2015
- [c5]Asma Cherif, Abdessamad Imine:
A Constraint-based Approach for Generating Transformation Patterns. FOCLASA 2015: 48-62 - 2014
- [j1]Asma Cherif, Abdessamad Imine, Michaël Rusinowitch:
Practical access control management for distributed collaborative editors. Pervasive Mob. Comput. 15: 62-86 (2014) - 2012
- [b1]Asma Chérif Berregba:
Access Control Models for Collaborative Applications. (Modèles de contrôle d'accès pour les applications collaboratives). University of Lorraine, Nancy, France, 2012 - 2011
- [c4]Asma Cherif, Abdessamad Imine, Michaël Rusinowitch:
Optimistic access control for distributed collaborative editors. SAC 2011: 861-868 - 2010
- [c3]Moulay Driss Mechaoui, Asma Cherif, Abdessamad Imine, Fatima Bendella:
Log garbage collector-based real time collaborative editor for mobile devices. CollaborateCom 2010: 1-10
2000 – 2009
- 2009
- [c2]Asma Cherif, Abdessamad Imine:
Undo-Based Access Control for Distributed Collaborative Editors. CDVE 2009: 101-108 - [c1]Abdessamad Imine, Asma Cherif, Michaël Rusinowitch:
A Flexible Access Control Model for Distributed Collaborative Editors. Secure Data Management 2009: 89-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint