Graph-based deep learning techniques for remote sensing applications: Techniques, taxonomy, and applications—A comprehensive review

MK Khlifi, W Boulila, IR Farah - Computer Science Review, 2023 - Elsevier
In the last decade, there has been a significant surge of interest in machine learning,
primarily driven by advancements in deep learning (DL). DL has emerged as a powerful …

A novel two-routers model based on category constraints secure data-dissemination-aware scheduling in next-generation communication networks

M Jemmali, A Ben Hmida, AY Sarhan - Journal of Network and Systems …, 2023 - Springer
Data breaches are a critical issue and have become one of the top widespread risks in
today's data-driven digital environment. Hence, Secure data outsourcing is essential in …

A novel smart multilevel security approach for secure data outsourcing in crisis

AY Sarhan - PeerJ Computer Science, 2023 - peerj.com
Abstract The Interconnected Network or the Internet has revolutionized digital
communications. It has expanded worldwide over the past four decades due to numerous …

Optimizing forest fire prevention: intelligent scheduling algorithms for drone-based surveillance system

M Jemmali, BML Kayed, W Boulila, H Amdouni… - Procedia Computer …, 2023 - Elsevier
Given the importance of forests and their role in maintaining the ecological balance, which
directly affects the planet, the climate, and the life on this planet, this research presents the …

A secure solution based on load-balancing algorithms between regions in the cloud environment

S Eljack, M Jemmali, M Denden, S Turki… - PeerJ Computer …, 2023 - peerj.com
The problem treated in this article is the storage of sensitive data in the cloud environment
and how to choose regions and zones to minimize the number of transfer file events …

An enhanced multilevel secure data dissemination approximate solution for future networks

MM Otoom, M Jemmali, AY Sarhan, I Achour… - Plos one, 2024 - journals.plos.org
Sensitive data, such as financial, personal, or classified governmental information, must be
protected throughout its cycle. This paper studies the problem of safeguarding transmitted …

Scheduling algorithms for data-protection based on security-classification constraints to data-dissemination

MM Otoom, M Jemmali, WM Khedr, AY Sarhan… - PeerJ Computer …, 2023 - peerj.com
Communication networks have played a vital role in changing people's life. However, the
rapid advancement in digital technologies has presented many drawbacks of the current …

An agent-based secure privacy-preserving decentralized protocol for sharing and managing digital health passport information during crises

AY Sarhan - PeerJ Computer Science, 2023 - peerj.com
The aim of this article is to identify a range of changes and challenges that present-day
technologies often present to contemporary societies, particularly in the context of smart city …

Optimizing Fire Control Monitoring System in Smart Cities

M Jemmali, L Kayed B. Melhim, W Boulila… - International Conference …, 2023 - Springer
Fires are a constant threat to human lives and property because their appearance and
location are unexpected, and their spread can inflict major damage and loss of life. Data …