Jaouhar Fattahi
Orcid: 0000-0002-3905-9099
According to our database1,
Jaouhar Fattahi
authored at least 46 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Recognition of Handwritten Tamazight Characters Using ResNet, MobileNet and VGG Transfer Learning.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024
Proceedings of the 16th International Conference on Electronics, 2024
Proceedings of the 10th International Conference on Control, 2024
Confusion Matrix Explainability to Improve Model Performance: Application to Network Intrusion Detection.
Proceedings of the 10th International Conference on Control, 2024
Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics.
Proceedings of the 10th International Conference on Control, 2024
Proceedings of the 10th International Conference on Control, 2024
Proceedings of the 10th International Conference on Control, 2024
Proceedings of the 10th International Conference on Control, 2024
2023
Proceedings of the 15th International Conference on Electronics, 2023
2022
SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022
Proceedings of the 14th International Conference on Electronics, 2022
2021
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020
2019
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
2018
SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
2017
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017
Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Proceedings of the 4th International Conference on Control, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 8th International Conference on Electronics, 2016
2015
Proceedings of the 2015 IEEE International Conference on Systems, 2015
Proceedings of the 2015 7th International Conference on Electronics, 2015
Proceedings of the 2015 7th International Conference on Electronics, 2015
2014
Proceedings of the 6th International Conference on Electronics, 2014
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014
2011
Dynamic Context-Aware and Limited Resources-Aware Service Adaptation for Pervasive Computing.
Adv. Softw. Eng., 2011