default search action
Jaouhar Fattahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Elyes Manai, Mohamed Mejri, Jaouhar Fattahi:
Confusion Matrix Explainability to Improve Model Performance: Application to Network Intrusion Detection. CoDIT 2024: 1-5 - [c38]Elyes Manai, Mohamed Mejri, Jaouhar Fattahi:
Intrusion Detection Explainability by Ensemble Learning with a Case Study. CoDIT 2024: 1542-1547 - [c37]Jaouhar Fattahi, Baha Eddine Lakdher, Mohamed Mejri, Ridha Ghayoula, Elyes Manai, Marwa Ziadia:
FingFor: a Deep Learning Tool for Biometric Forensics. CoDIT 2024: 1667-1672 - [c36]Jaouhar Fattahi, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Sahbi Bahroun, Marwa Ziadia:
Sexism Discovery using CNN, Word Embeddings, NLP and Data Augmentation. CoDIT 2024: 1685-1690 - [c35]Jaouhar Fattahi, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Emil Pricop, Baha Eddine Lakdher:
Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics. CoDIT 2024: 1697-1702 - [c34]Jaouhar Fattahi, Baha Eddine Lakdher, Mohamed Mejri, Ridha Ghayoula, Feriel Sghaier, Laila Boumlik:
The Good and Bad Seeds of CNN Parallelization in Forensic Facial Recognition. CoDIT 2024: 1719-1724 - [c33]Ridha Ghayoula, Wided Amara, Amor Smida, Jaouhar Fattahi, Mohamed Ibrahim Waly, Sahbi Bahroun, Issam El Gmati:
RSA-1024 Cryptography on Artix-7 FPGA: Medical Imaging Application. ECAI 2024: 1-6 - [c32]Elyes Manai, Mohamed Mejri, Jaouhar Fattahi:
Minimizing Model Misclassification Using Regularized Loss Interpretability. IIAI-AAI 2024: 231-236 - [c31]Jaouhar Fattahi, Feriel Sghaier, Mohamed Mejri, Sahbi Bahroun, Ridha Ghayoula, Elyes Manai:
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks. SoMeT 2024: 72-84 - [c30]Jaouhar Fattahi, Obeb Fkiri, Mohamed Mejri, Ridha Ghayoula:
Hands and Palms Recognition by Transfer Learning for Forensics: A Comparative Study. SoMeT 2024: 213-225 - [c29]Jaouhar Fattahi, Feriel Sghaier, Mohamed Mejri, Elyes Manai, Ridha Ghayoula:
Recognition of Handwritten Tamazight Characters Using ResNet, MobileNet and VGG Transfer Learning. SoMeT 2024: 429-440 - [c28]Elyes Manai, Mohamed Mejri, Jaouhar Fattahi:
Fingerprint Fraud Explainability Using Grad-Cam for Forensic Procedures. SoMeT 2024: 457-470 - 2023
- [c27]Elyes Manai, Mohamed Mejri, Jaouhar Fattahi:
Impact of Feature Encoding on Malware Classification Explainability. ECAI 2023: 1-6 - [i18]Ridha Ghayoula, Jaouhar Fattahi, Amor Smida, Issam El Gmati, Emil Pricop, Marwa Ziadia:
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7. CoRR abs/2301.01889 (2023) - [i17]Elyes Manai, Mohamed Mejri, Jaouhar Fattahi:
Impact of Feature Encoding on Malware Classification Explainability. CoRR abs/2307.05614 (2023) - 2022
- [c26]Ridha Ghayoula, Jaouhar Fattahi, Amor Smida, Issam El Gmati, Emil Pricop, Marwa Ziadia:
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7. ECAI 2022: 1-5 - [c25]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Ridha Ghayoula:
SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks. SoMeT 2022: 143-162 - 2021
- [c24]Marwa Ziadia, Mohamed Mejri, Jaouhar Fattahi:
$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications. FPS 2021: 321-337 - [c23]Jaouhar Fattahi, Mohamed Mejri:
SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques. CSP 2021: 107-112 - [c22]Jaouhar Fattahi, Mohamed Mejri:
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes. CSP 2021: 193-199 - [c21]Marwa Ziadia, Mohamed Mejri, Jaouhar Fattahi:
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting. SoMeT 2021: 85-98 - [c20]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia:
Extreme Gradient Boosting for Cyberpropaganda Detection. SoMeT 2021: 99-112 - [c19]Jaouhar Fattahi, Marwa Ziadia, Mohamed Mejri:
Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings. SoMeT 2021: 155-165 - 2020
- [j2]Marwa Ziadia, Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications. Inf. 11(3): 130 (2020) - [i16]Jaouhar Fattahi, Mohamed Mejri:
SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques. CoRR abs/2010.07444 (2020) - [i15]Jaouhar Fattahi, Mohamed Mejri:
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes. CoRR abs/2012.15041 (2020)
2010 – 2019
- 2019
- [c18]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions. CCECE 2019: 1-5 - [c17]Nicolae Paraschiv, Emil Pricop, Jaouhar Fattahi, Florin Zamfir:
Towards a reliable approach on scaling in data acquisition. ICSTCC 2019: 84-88 - [i14]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions. CoRR abs/1903.00499 (2019) - [i13]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Authentication by Witness Functions. CoRR abs/1903.05791 (2019) - 2018
- [c16]Jaouhar Fattahi:
A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions. CCECE 2018: 1-6 - [c15]Jaouhar Fattahi, Mario Couture, Mohamed Mejri:
SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules. SoMeT 2018: 187-200 - [i12]Jaouhar Fattahi, Mohamed Mejri:
Secrecy by Witness-Functions under Equational Theories. CoRR abs/1801.01612 (2018) - [i11]Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi:
Fusion of ANN and SVM Classifiers for Network Attack Detection. CoRR abs/1801.02746 (2018) - [i10]Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani:
Secrecy by Witness-Functions on Increasing Protocols. CoRR abs/1801.03597 (2018) - [i9]Kalthoum Ouerghi, Najib Fadlallah, Amor Smida, Ridha Ghayoula, Jaouhar Fattahi, Noureddine Boulejfen:
Circular Antenna Array Design for Breast Cancer Detection. CoRR abs/1801.05068 (2018) - [i8]Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir:
Considerations regarding security issues impact on systems availability. CoRR abs/1801.05459 (2018) - [i7]Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani:
Relaxed Conditions for Secrecy in a Role-Based Specification. CoRR abs/1801.08410 (2018) - [i6]Jaouhar Fattahi:
A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions. CoRR abs/1803.08151 (2018) - 2017
- [c14]Emil Pricop, Jaouhar Fattahi, Nicolae Paraschiv, Florin Zamfir, Elies Ghayoula:
Method for authentication of sensors connected on Modbus TCP. CoDIT 2017: 679-683 - [c13]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Elies Ghayoula, Ouejdene Samoud, Emil Pricop:
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context. SMC 2017: 1127-1132 - [c12]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop:
Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose? SMC 2017: 2649-2654 - [c11]Elies Ghayoula, Ammar Bouallegue, Ridha Ghayoula, Jaouhar Fattahi, Emil Pricop, Jean-Yves Chouinard:
Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems. SMC 2017: 3290-3295 - [c10]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Emil Pricop, Ouejdene Samoud:
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models. SoMeT 2017: 441-453 - [i5]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Ouejdene Samoud, Elies Ghayoula, Emil Pricop:
Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context. CoRR abs/1707.07801 (2017) - [i4]Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop:
Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose? CoRR abs/1707.09078 (2017) - [i3]Elies Ghayoula, Ridha Ghayoula, Jaouhar Fattahi, Emil Pricop, Jean-Yves Chouinard, Ammar Bouallegue:
Radiation Pattern Synthesis Using Hybrid Fourier- Woodward-Lawson-Neural Networks for Reliable MIMO Antenna Systems. CoRR abs/1710.02633 (2017) - [i2]Darine Ameyed, Fehmi Jaafar, Jaouhar Fattahi:
A Slow Read attack Using Cloud. CoRR abs/1712.01939 (2017) - 2016
- [b1]Jaouhar Fattahi:
Analyse des protocoles cryptographiques par les fonctions témoins. Université Laval, Canada, 2016 - [c9]Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir:
Considerations regarding security issues impact on systems availability. ECAI 2016: 1-6 - [c8]Jaouhar Fattahi, Mohamed Mejri, Ridha Ghayoula, Emil Pricop:
Formal reasoning on authentication in security protocols. SMC 2016: 282-289 - [c7]Elies Ghayoula, Jaouhar Fattahi, Ridha Ghayoula, Emil Pricop, G. Stamatescu, Jean-Yves Chouinard, Ammar Bouallegue:
Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications. SMC 2016: 4700-4705 - [c6]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Authentication by Witness Functions. Trustcom/BigDataSE/ISPA 2016: 1990-1997 - 2015
- [c5]Darine Ameyed, Fehmi Jaafar, Jaouhar Fattahi:
A slow read attack using cloud. ECAI 2015 - [c4]Jaouhar Fattahi, Mohamed Mejri:
Secrecy by witness-functions under equational theories. ECAI 2015 - [c3]Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions. SMC 2015: 1189-1196 - 2014
- [c2]Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani:
Secrecy by Witness Functions. FMS @ Petri Nets 2014: 34-52 - [c1]Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani:
Secrecy by witness-functions on increasing protocols. ECAI 2014: 1-6 - [i1]Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani:
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols. CoRR abs/1408.2774 (2014) - 2011
- [j1]Moeiz Miraoui, Chakib Tadj, Jaouhar Fattahi, Chokri Ben Amar:
Dynamic Context-Aware and Limited Resources-Aware Service Adaptation for Pervasive Computing. Adv. Softw. Eng. 2011: 649563:1-649563:11 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint