default search action
Mohamed Ibn Khedher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Khaoula Ajroudi, Mohamed Ibn Khedher, Olfa Jemai, Mounim A. El-Yacoubi:
Exploring the Efficacy of Text Embeddings in Early Dementia Diagnosis from Speech. HSI 2024: 1-6 - [c20]Karim Haddada, Mohamed Ibn Khedher, Olfa Jemai, Sarra Iben Khedher, Mounim A. El-Yacoubi:
Assessing the Interpretability of Machine Learning Models in Early Detection of Alzheimer's Disease. HSI 2024: 1-6 - [c19]Taissir Fekih Romdhane, Mohamed Ibn Khedher, Mounim A. El-Yacoubi:
PredictStr: A Balanced Benchmark Dataset for Improve Stroke Prediction. HSI 2024: 1-6 - [c18]Marwa Zaabi, Mohamed Ibn Khedher, Mounim A. El-Yacoubi:
Improving Alzheimer's Diagnosis Using Vision Transformers and Transfer Learning. HSI 2024: 1-6 - [c17]Mohamed Ibn Khedher, Afef Awadid, Augustin Lemesle, Zakaria Chihani:
On the Formal Robustness Evaluation for AI-based Industrial Systems. MODELSWARD 2024: 311-321 - 2023
- [j5]Omar El Mellouki, Mohamed Ibn Khedher, Mounim A. El-Yacoubi:
Abstract Layer for LeakyReLU for Neural Network Verification Based on Abstract Interpretation. IEEE Access 11: 33401-33413 (2023) - [c16]Karim Haddada, Mohamed Ibn Khedher, Olfa Jemai:
Comparative study of Deep Learning architectures for Early Alzheimer Detection. CW 2023: 185-192 - 2022
- [j4]Houda Jmila, Mohamed Ibn Khedher:
Adversarial machine learning for network intrusion detection: A comparative study. Comput. Networks 214: 109073 (2022) - 2021
- [c15]Hatem Ibn-Khedher, Mohamed Ibn Khedher, Makhlouf Hadji:
Mathematical Programming Approach for Adversarial Attack Modelling. ICAART (2) 2021: 343-350 - [c14]Mohamed Ibn Khedher, Mallek Mziou-Sallami, Makhlouf Hadji:
Improving Decision-Making-Process for Robot Navigation Under Uncertainty. ICAART (2) 2021: 1105-1113 - [c13]Mohamed Ibn Khedher, Mehdi Rezzoug:
Analyzing Adversarial Attacks against Deep Learning for Robot Navigation. ICAART (2) 2021: 1114-1121 - [c12]Mohamed Ibn Khedher, Hatem Ibn-Khedher, Makhlouf Hadji:
Dynamic and Scalable Deep Neural Network Verification Algorithm. ICAART (2) 2021: 1122-1130 - [c11]Hatem Ibn-Khedher, Makhlouf Hadji, Mohamed Ibn Khedher, Selma Khebbache:
Constrained Clustering Problems: NewOptimization Algorithms. ICAISC (2) 2021: 159-170 - 2020
- [j3]Mohamed Ibn Khedher, Houda Jmila, Mounim A. El-Yacoubi:
Automatic processing of Historical Arabic Documents: A comprehensive Survey. Pattern Recognit. 100: 107144 (2020) - [c10]Abir Fathallah, Mohamed Ibn Khedher, Mounim A. El-Yacoubi, Najoua Essoukri Ben Amara:
Evaluation of Feature-Embedding Methods for Word Spotting in Historical Arabic Documents. SSD 2020: 34-39
2010 – 2019
- 2019
- [j2]Abir Fathallah, Mohamed Ibn Khedher, Mounim A. El-Yacoubi, Najoua Essoukri Ben Amara:
Triplet CNN-based Word Spotting of Historical Arabic Documents. Aust. J. Intell. Inf. Process. Syst. 15(2): 44-51 (2019) - [c9]Mallek Mziou-Sallami, Mohamed Ibn Khedher, Asma Trabelsi, Samy Kerboua-Benlarbi, Dimitri Bettebghor:
Safety and Robustness of Deep Neural Networks Object Recognition Under Generic Attacks. ICONIP (4) 2019: 274-286 - [c8]Houda Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim A. El-Yacoubi:
Siamese Network Based Feature Learning for Improved Intrusion Detection. ICONIP (1) 2019: 377-389 - 2018
- [c7]Mohamed Ibn Khedher, Houda Jmila, Mounim A. El-Yacoubi:
Fusion of Interest Point/Image based descriptors for efficient person re-identification. IJCNN 2018: 1-7 - 2017
- [j1]Mohamed Ibn Khedher, Mounim A. El-Yacoubi, Bernadette Dorizzi:
Fusion of appearance and motion-based sparse representations for multi-shot person re-identification. Neurocomputing 248: 94-104 (2017) - [c6]Houda Jmila, Mohamed Ibn Khedher, Mounim A. El-Yacoubi:
Estimating VNF Resource Requirements Using Machine Learning Techniques. ICONIP (1) 2017: 883-892 - 2015
- [c5]Mohamed Ibn Khedher, Mounim A. El-Yacoubi:
Two-Stage Filtering Scheme for Sparse Representation Based Interest Point Matching for Person Re-identification. ACIVS 2015: 345-356 - [c4]Mohamed Ibn Khedher, Mounim A. El-Yacoubi:
Local Sparse Representation Based Interest Point Matching for Person Re-identification. ICONIP (3) 2015: 241-250 - 2014
- [b1]Mohamed Ibn Khedher:
Ré-identification de personnes à partir des séquences vidéo. (Person re-identification from video sequence). Telecom & Management SudParis, Évry, Essonne, France, 2014 - 2013
- [c3]Mohamed Ibn Khedher, Mounim A. El-Yacoubi, Bernadette Dorizzi:
Multi-shot SURF-based person re-identification via sparse representation. AVSS 2013: 159-164 - 2012
- [c2]Mohamed Ibn Khedher, Mounim A. El-Yacoubi, Bernadette Dorizzi:
Probabilistic matching pair selection for SURF-based person re-identification. BIOSIG 2012: 1-6 - [c1]Mohamed Ibn Khedher, Mounim A. El-Yacoubi, Bernadette Dorizzi:
Human Action Recognition using Continuous HMMs and HOG/HOF Silhouette Representation. ICPRAM (2) 2012: 503-508
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint