Khalid Chougdali

Orcid: 0000-0002-1072-0461

According to our database1, Khalid Chougdali authored at least 36 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Plant Disease Recognition: A Comprehensive Mini Review.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

Blockchain Based Smart Contract to Enhance Security in Smart City.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

A Survey on IOTA Based Technology for Enhanced IoT Security.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

Blockchain Framework Tailored for Agricultural IoTs.
Proceedings of the Bioinspired Systems for Translational Applications: From Robotics to Social Engineering, 2024

2023
Internet of Things Systems Security Based on the Physical Objects: An overview.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

An Approach for intrusion detection using machine learning algorithms.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

A New Intrusion Detection System Based on Convolutional Neural Network.
Proceedings of the IEEE International Conference on Communications, 2023

Real-Time Anomaly Detection in SDN Architecture Using Integrated SIEM and Machine Learning for Enhancing Network Security.
Proceedings of the IEEE Global Communications Conference, 2023

SSHCEth: Secure Smart Home Communications based on Ethereum Blockchain and Smart Contract.
Proceedings of the IEEE Global Communications Conference, 2023

A survey on Machine Learning for IoT Trust Management.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2023

Enhancing Forensic Analysis Using a Machine Learning-based Approach.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

Improving IoT Botnet Detection Using Ensemble Learning.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

2022
LWKPCA: A New Robust Method for Face Recognition Under Adverse Conditions.
IEEE Access, 2022

Impact of security and privacy risks on the adoption of IoT: A state of the art.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

Security of Internet Of Things Using Machine Learning.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Network intrusion detection using Machine Learning approach.
Proceedings of the ICICM 2022: The 12th International Conference on Information Communication and Management, London, United Kingdom, July 13, 2022

2021
Robust face recognition based on a new Kernel-PCA using RRQR factorization.
Intell. Data Anal., 2021

DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features.
IEEE Access, 2021

File Slack Handling Tool.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Fuzzy ℓ2, p-norm based PCA for Intrusion Detection System.
Proceedings of the 2nd IEEE International Conference on Electronics, 2020

2019
Energy-Efficient Associations for IoT networks with UAV: A Regret Matching Based Approach.
Proceedings of the 9th International Conference on Information Communication and Management, 2019

Detection of Timestamps Tampering in NTFS using Machine Learning.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

2018
Improving Network Intrusion Detection Using Geometric Mean LDA.
Int. J. Netw. Secur., 2018

A Network Intrusion Detection Based on Improved Nonlinear Fuzzy Robust PCA.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

2017
An effective cyber attack detection system based on an improved OMPCA.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

A Median Nearest Neighbors LDA for Anomaly Network Detection.
Proceedings of the Codes, Cryptology and Information Security, 2017

Identifying Intrusions in Computer Networks Using Robust Fuzzy PCA.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Intrusion detection system using PCA and Fuzzy PCA techniques.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

2015
Network intrusion detection system using L1-norm PCA.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2010
Kernel relevance weighted discriminant analysis for face recognition.
Pattern Anal. Appl., 2010

2009
Fuzzy linear and nonlinear discriminant analysis algorithms for face recognition.
Intell. Data Anal., 2009

2008
Kernel Weighted Scatter-Difference-Based Discriminant Analysis for Face Recognition.
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008

2007
Using Wavelets based Feature Extraction and Relevance Weighted LDA for Face Recognition.
Proceedings of the Pattern Recognition in Information Systems, 2007


  Loading...