Explainable artificial intelligence for cybersecurity: a literature survey F Charmet, HC Tanuwidjaja, S Ayoubi, PF Gimenez, Y Han, H Jmila, ... Annals of Telecommunications 77 (11), 789-812, 2022 | 53 | 2022 |
Adversarial machine learning for network intrusion detection: A comparative study H Jmila, MI Khedher Computer Networks 214, 109073, 2022 | 52 | 2022 |
Generative deep learning for Internet of Things network traffic generation MR Shahid, G Blanc, H Jmila, Z Zhang, H Debar 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing …, 2020 | 45 | 2020 |
Estimating VNF resource requirements using machine learning techniques H Jmila, MI Khedher, MA El Yacoubi Neural Information Processing: 24th International Conference, ICONIP 2017 …, 2017 | 41 | 2017 |
A Survey of Smart Home IoT Device Classification Using Machine Learning-based Network Traffic Analysis H Jmila, G Blanc, MR Shahid, M Lazrag IEEE Access, 2022 | 30 | 2022 |
Automatic processing of Historical Arabic Documents: a comprehensive survey MI Khedher, H Jmila, MA El-Yacoubi Pattern Recognition 100, 107144, 2020 | 20 | 2020 |
Siamese network based feature learning for improved intrusion detection H Jmila, M Ibn Khedher, G Blanc, MA El Yacoubi Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019 | 18 | 2019 |
Towards Security-Aware 5G Slice Embedding H Jmila, G Blanc Computers & Security, 102075, 2021 | 11 | 2021 |
Solving security constraints for 5G slice embedding: A proof-of-concept F Boutigny, S Betge-Brezetz, G Blanc, A Lavignotte, H Debar, H Jmila Computers & Security 89, 101662, 2020 | 10 | 2020 |
An adaptive load balancing scheme for evolving virtual networks H Jmila, D Zeghlache 2015 12th Annual IEEE Consumer Communications and Networking Conference …, 2015 | 10 | 2015 |
Le rôle des médias et des TIC dans les «révolutions arabes»: l’exemple de la Tunisie N Abid, M Aouadi, M Ben Mohamed, A Bakhti, J Djemali, H Jmila, ... Chimères, 219-235, 2011 | 10 | 2011 |
RSforEVN: Node reallocation algorithm for virtual networks adaptation H Jmila, I Houidi, D Zeghlache 2014 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2014 | 9 | 2014 |
Designing security-aware service requests for NFV-enabled networks H Jmila, G Blanc 2019 28th International Conference on Computer Communication and Networks …, 2019 | 8 | 2019 |
On the formal evaluation of the robustness of neural networks and its pivotal relevance for AI-based safety-critical domains MI Khedher, H Jmila, M El Yacoubi International Journal of Network Dynamics and Intelligence, 100018, 2023 | 7 | 2023 |
Fusion of interest point/image based descriptors for efficient person re-identification MI Khedher, H Jmila, MA El Yacoubi 2018 International Joint Conference on Neural Networks (IJCNN), 1-7, 2018 | 6 | 2018 |
A self-stabilizing framework for dynamic bandwidth allocation in virtual networks H Jmila, K Drira, D Zeghlache NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 69-77, 2016 | 5 | 2016 |
Dynamic resource allocation and management in virtual networks and Clouds H Jmila Institut National des Télécommunications, 2015 | 3 | 2015 |
Data-driven evaluation of intrusion detectors: a methodological framework S Ayoubi, G Blanc, H Jmila, T Silverston, S Tixeuil International Symposium on Foundations and Practice of Security, 142-157, 2022 | 2 | 2022 |
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges S Chennoufi, G Blanc, H Jmila, C Kiennert ARES 2024: The 19th International Conference on Availability, Reliability …, 2024 | | 2024 |
XAI-driven Adversarial Attacks on Network Intrusion Detectors S Okada, H Jmila, K Akashi, T Mitsunaga, Y Sekiya, H Takase, G Blanc, ... European Interdisciplinary Cybersecurity Conference, 65-73, 2024 | | 2024 |