关注
Ali Chehab
标题
引用次数
年份
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications
F Trad, A Chehab
arXiv preprint arXiv:2403.17787, 2024
2024
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models
F Trad, A Chehab
Machine Learning and Knowledge Extraction 6 (1), 367-384, 2024
72024
Assessing the effectiveness of siamese neural networks to mitigate frequent retraining in IoT device identification models
F Trad, A Hussein, A Chehab
2023 International Conference on Platform Technology and Service (PlatCon …, 2023
12023
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms
HN Noura, O Salman, A Chehab
Journal of Information Security and Applications 76, 103514, 2023
12023
High-Density FeFET-based CAM Cell Design Via Multi-Dimensional Encoding
H Noureddine, O Bekdache, M Al Tawil, R Kanj, A Chehab, M Fouda, ...
Proceedings of the Great Lakes Symposium on VLSI 2023, 403-407, 2023
12023
Machine learning‐based anti‐jamming technique at the physical layer
M Chehimi, MK Awad, M Al‐Husseini, A Chehab
Concurrency and Computation: Practice and Experience 35 (9), e7649, 2023
12023
Leveraging Adversarial Samples for Enhanced Classification of Malicious and Evasive PDF Files
F Trad, A Hussein, A Chehab
Applied Sciences 13 (6), 3472, 2023
2023
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
JPA Yaacoub, HN Noura, O Salman, A Chehab
Internet of Things and Cyber-Physical Systems 3, 280-308, 2023
382023
Lesca: Lightweight stream cipher algorithm for emerging systems
H Noura, O Salman, R Couturier, A Chehab
Ad Hoc Networks 138, 102999, 2023
122023
Free Text Keystroke Dynamics-based Authentication with Continuous Learning: A Case Study
F Trad, A Hussein, A Chehab
2022 IEEE 21st International Conference on Ubiquitous Computing and …, 2022
12022
Using siamese neural networks for efficient and accurate IoT device identification
F Trad, A Hussein, A Chehab
2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC …, 2022
32022
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability
HN Noura, O Salman, A Chehab, R Couturier
2022 16th International Conference on Signal-Image Technology & Internet …, 2022
2022
Machine learning for physical layer security: Limitations, challenges and recommendation
R Melki, HN Noura, A Chehab, R Couturier
2022 16th International Conference on Signal-Image Technology & Internet …, 2022
12022
Efficient and secure selective cipher scheme for MIoT compressed images
HN Noura, O Salman, R Couturier, A Chehab
Ad Hoc Networks 135, 102928, 2022
12022
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms
HN Noura, A Chehab
Journal of Information Security and Applications 68, 103264, 2022
42022
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
JPA Yaacoub, HN Noura, O Salman, A Chehab
Internet of Things 19, 100544, 2022
392022
Mutated traffic detection and recovery: an adversarial generative deep learning approach
O Salman, IH Elhajj, A Kayssi, A Chehab
Annals of Telecommunications 77 (5), 395-406, 2022
52022
Network coding and MPTCP: Enhancing security and performance in an SDN environment
HN Noura, R Melki, A Chehab
Journal of Information Security and Applications 66, 103165, 2022
22022
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems
HN Noura, O Salman, R Couturier, A Chehab
Vehicular Communications 34, 100416, 2022
172022
A single-pass and one-round message authentication encryption for limited IoT devices
HN Noura, O Salman, R Couturier, A Chehab
IEEE Internet of Things Journal 9 (18), 17885-17900, 2022
62022
系统目前无法执行此操作,请稍后再试。
文章 1–20