Jaouhar Fattahi

Orcid: 0000-0002-3905-9099

According to our database1, Jaouhar Fattahi authored at least 46 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fingerprint Fraud Explainability Using Grad-Cam for Forensic Procedures.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024

Recognition of Handwritten Tamazight Characters Using ResNet, MobileNet and VGG Transfer Learning.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024

Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024

Hands and Palms Recognition by Transfer Learning for Forensics: A Comparative Study.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024

Minimizing Model Misclassification Using Regularized Loss Interpretability.
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024

RSA-1024 Cryptography on Artix-7 FPGA: Medical Imaging Application.
Proceedings of the 16th International Conference on Electronics, 2024

Intrusion Detection Explainability by Ensemble Learning with a Case Study.
Proceedings of the 10th International Conference on Control, 2024

Confusion Matrix Explainability to Improve Model Performance: Application to Network Intrusion Detection.
Proceedings of the 10th International Conference on Control, 2024

Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics.
Proceedings of the 10th International Conference on Control, 2024

Sexism Discovery using CNN, Word Embeddings, NLP and Data Augmentation.
Proceedings of the 10th International Conference on Control, 2024

The Good and Bad Seeds of CNN Parallelization in Forensic Facial Recognition.
Proceedings of the 10th International Conference on Control, 2024

FingFor: a Deep Learning Tool for Biometric Forensics.
Proceedings of the 10th International Conference on Control, 2024

2023
Impact of Feature Encoding on Malware Classification Explainability.
Proceedings of the 15th International Conference on Electronics, 2023

2022
SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022

FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7.
Proceedings of the 14th International Conference on Electronics, 2022

2021
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Extreme Gradient Boosting for Cyberpropaganda Detection.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

2019
Towards a reliable approach on scaling in data acquisition.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Relaxed Conditions for Secrecy in a Role-Based Specification.
CoRR, 2018

Circular Antenna Array Design for Breast Cancer Detection.
CoRR, 2018

Fusion of ANN and SVM Classifiers for Network Attack Detection.
CoRR, 2018

SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

2017
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Method for authentication of sensors connected on Modbus TCP.
Proceedings of the 4th International Conference on Control, 2017

2016
Analyse des protocoles cryptographiques par les fonctions témoins.
PhD thesis, 2016

Authentication by Witness Functions.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Formal reasoning on authentication in security protocols.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Considerations regarding security issues impact on systems availability.
Proceedings of the 8th International Conference on Electronics, 2016

2015
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Secrecy by witness-functions under equational theories.
Proceedings of the 2015 7th International Conference on Electronics, 2015

A slow read attack using cloud.
Proceedings of the 2015 7th International Conference on Electronics, 2015

2014
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols.
CoRR, 2014

Secrecy by witness-functions on increasing protocols.
Proceedings of the 6th International Conference on Electronics, 2014

Secrecy by Witness Functions.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2011
Dynamic Context-Aware and Limited Resources-Aware Service Adaptation for Pervasive Computing.
Adv. Softw. Eng., 2011


  Loading...