Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications F Trad, A Chehab arXiv preprint arXiv:2403.17787, 2024 | | 2024 |
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models F Trad, A Chehab Machine Learning and Knowledge Extraction 6 (1), 367-384, 2024 | 7 | 2024 |
Assessing the effectiveness of siamese neural networks to mitigate frequent retraining in IoT device identification models F Trad, A Hussein, A Chehab 2023 International Conference on Platform Technology and Service (PlatCon …, 2023 | 1 | 2023 |
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms HN Noura, O Salman, A Chehab Journal of Information Security and Applications 76, 103514, 2023 | 1 | 2023 |
High-Density FeFET-based CAM Cell Design Via Multi-Dimensional Encoding H Noureddine, O Bekdache, M Al Tawil, R Kanj, A Chehab, M Fouda, ... Proceedings of the Great Lakes Symposium on VLSI 2023, 403-407, 2023 | 1 | 2023 |
Machine learning‐based anti‐jamming technique at the physical layer M Chehimi, MK Awad, M Al‐Husseini, A Chehab Concurrency and Computation: Practice and Experience 35 (9), e7649, 2023 | 1 | 2023 |
Leveraging Adversarial Samples for Enhanced Classification of Malicious and Evasive PDF Files F Trad, A Hussein, A Chehab Applied Sciences 13 (6), 3472, 2023 | | 2023 |
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things and Cyber-Physical Systems 3, 280-308, 2023 | 38 | 2023 |
Lesca: Lightweight stream cipher algorithm for emerging systems H Noura, O Salman, R Couturier, A Chehab Ad Hoc Networks 138, 102999, 2023 | 12 | 2023 |
Free Text Keystroke Dynamics-based Authentication with Continuous Learning: A Case Study F Trad, A Hussein, A Chehab 2022 IEEE 21st International Conference on Ubiquitous Computing and …, 2022 | 1 | 2022 |
Using siamese neural networks for efficient and accurate IoT device identification F Trad, A Hussein, A Chehab 2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC …, 2022 | 3 | 2022 |
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability HN Noura, O Salman, A Chehab, R Couturier 2022 16th International Conference on Signal-Image Technology & Internet …, 2022 | | 2022 |
Machine learning for physical layer security: Limitations, challenges and recommendation R Melki, HN Noura, A Chehab, R Couturier 2022 16th International Conference on Signal-Image Technology & Internet …, 2022 | 1 | 2022 |
Efficient and secure selective cipher scheme for MIoT compressed images HN Noura, O Salman, R Couturier, A Chehab Ad Hoc Networks 135, 102928, 2022 | 1 | 2022 |
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms HN Noura, A Chehab Journal of Information Security and Applications 68, 103264, 2022 | 4 | 2022 |
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things 19, 100544, 2022 | 39 | 2022 |
Mutated traffic detection and recovery: an adversarial generative deep learning approach O Salman, IH Elhajj, A Kayssi, A Chehab Annals of Telecommunications 77 (5), 395-406, 2022 | 5 | 2022 |
Network coding and MPTCP: Enhancing security and performance in an SDN environment HN Noura, R Melki, A Chehab Journal of Information Security and Applications 66, 103165, 2022 | 2 | 2022 |
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems HN Noura, O Salman, R Couturier, A Chehab Vehicular Communications 34, 100416, 2022 | 17 | 2022 |
A single-pass and one-round message authentication encryption for limited IoT devices HN Noura, O Salman, R Couturier, A Chehab IEEE Internet of Things Journal 9 (18), 17885-17900, 2022 | 6 | 2022 |