Mohamed Mejri
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2024
CoRR, 2024
A Novel Hyperdimensional Computing Framework for Online Time Series Forecasting on the Edge.
CoRR, 2024
Error Resilient Hyperdimensional Computing Using Hypervector Encoding and Cross-Clustering.
Proceedings of the 42nd IEEE VLSI Test Symposium, 2024
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Recognition of Handwritten Tamazight Characters Using ResNet, MobileNet and VGG Transfer Learning.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
ADARE-HD: Adaptive-Resolution Framework for Efficient Object Detection and Tracking via HD-Computing.
Proceedings of the 67th IEEE International Midwest Symposium on Circuits and Systems, 2024
DeepER-HD: An Error Resilient HyperDimensional Computing Framework with DNN Front-End for Feature Selection.
Proceedings of the 25th IEEE Latin American Test Symposium, 2024
TEACH: Outlier Oriented Testing of Analog/Mixed-Signal Circuits Using One-class Hyperdimensional Clustering.
Proceedings of the IEEE International Test Conference, 2024
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024
Proceedings of the IEEE International Conference on Industrial Technology, 2024
AMS Test Stimulus Generation and Response Analysis Using Hyperdimensional Clustering: Minimizing Misclassification Rate.
Proceedings of the IEEE European Test Symposium, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the 10th International Conference on Control, 2024
Confusion Matrix Explainability to Improve Model Performance: Application to Network Intrusion Detection.
Proceedings of the 10th International Conference on Control, 2024
Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics.
Proceedings of the 10th International Conference on Control, 2024
Proceedings of the 10th International Conference on Control, 2024
Proceedings of the 10th International Conference on Control, 2024
Proceedings of the 10th International Conference on Control, 2024
2023
HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain.
Future Internet, March, 2023
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2023
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023
Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 15th International Conference on Electronics, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Detection of suspicious internet traffic based on differential analysis and logical rules.
J. Comput. Virol. Hacking Tech., 2022
SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022
Low Power Neural Network Accelerators Using Collaborative Weight Tuning and Shared Shift-Add optimization.
Proceedings of the 65th IEEE International Midwest Symposium on Circuits and Systems, 2022
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022
2021
Semantic Segmentation and Object Detection Towards Instance Segmentation: Breast Tumor Identification.
CoRR, 2021
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020
Int. J. Inf. Sec., 2020
RandomForestMLP: An Ensemble-Based Multi-Layer Perceptron Against Curse of Dimensionality.
CoRR, 2020
Comput. Secur., 2020
Information security risk assessment based on decomposition probability via Bayesian Network.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
2018
SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018
Proceedings of the 11th International Conference on Developments in eSystems Engineering, 2018
2017
Comput. Lang. Syst. Struct., 2017
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017
Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Proceedings of the First Conference on Language Processing and Knowledge Management, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016
Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
2015
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the 2015 IEEE International Conference on Systems, 2015
Proceedings of the Service-Oriented Computing - ICSOC 2015 Workshops, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the 2015 7th International Conference on Electronics, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
AVTAC : A Framework for Automatic Auditing of Access Control in Windows and Linux Systems.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2014
Proceedings of the 6th International Conference on Electronics, 2014
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014
2013
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test.
Int. J. Grid Util. Comput., 2013
Proceedings of the IEEE 12th International Conference on Intelligent Software Methodologies, 2013
2012
Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method.
J. Comput. Networks Commun., 2012
FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012
2011
J. Symb. Comput., 2011
2010
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010
Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.
J. Comput. Virol., 2009
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2008
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
Proceedings of the SECRYPT 2008, 2008
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007
Practical and Universal Interpretation Functions for Secrecy.
Proceedings of the SECRYPT 2007, 2007
A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
A Formal Translation From an Imperative Language With Array to a Declarative Language.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
2005
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2005
Formal and Efficient Enforcement of Security Policies.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005
2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, 2003
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997