Ahmed Oun

Orcid: 0000-0001-6069-9261

According to our database1, Ahmed Oun authored at least 12 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mobile Devices or Head-Mounted Displays: A Comparative Review and Analysis of Augmented Reality in Healthcare.
IEEE Access, 2024

Relay Selection Machine Learning-Based for a DF Cooperative System with Energy Harvesting and Signal Space Diversity.
Proceedings of the 67th IEEE International Midwest Symposium on Circuits and Systems, 2024

Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-Time Environment.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Enhancing Cybersecurity: A Pipeline Approach for Efficient Machine Learning Intrusion Detection.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

PUF-Based Authentication for the Security of IoT Devices.
Proceedings of the IEEE International Conference on Electro Information Technology, 2023

2021
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures.
ACM J. Emerg. Technol. Comput. Syst., 2021

Analysis of Swarm Intelligence Based ANN Algorithms for Attacking PUFs.
IEEE Access, 2021

Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security.
IEEE Access, 2021

Design of a Delay-Based FPGA PUF Resistant to Machine Learning Attacks.
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021

2020
Defense Mechanism Vulnerability Analysis of Ring Oscillator PUFs Against Neural Network Modeling Attacks using the Dragonfly Algorithm.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

2019
Analysis and Machine Learning Vulnerability Assessment of XOR-Inverter based Ring Oscillator PUF Design.
Proceedings of the 62nd IEEE International Midwest Symposium on Circuits and Systems, 2019

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019


  Loading...