Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Fattahi, Jaouhar"'
This paper investigates the impact of feature encoding techniques on the explainability of XAI (Explainable Artificial Intelligence) algorithms. Using a malware classification dataset, we trained an XGBoost model and compared the performance of two f
Externí odkaz:
http://arxiv.org/abs/2307.05614
FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must of
Externí odkaz:
http://arxiv.org/abs/2301.01889
Autor:
Fattahi, Jaouhar, Mejri, Mohamed
Fingerprint recognition is often a game-changing step in establishing evidence against criminals. However, we are increasingly finding that criminals deliberately alter their fingerprints in a variety of ways to make it difficult for technicians and
Externí odkaz:
http://arxiv.org/abs/2012.15041
Autor:
Fattahi, Jaouhar, Mejri, Mohamed
In this paper, we put forward a new tool, called SpaML, for spam detection using a set of supervised and unsupervised classifiers, and two techniques imbued with Natural Language Processing (NLP), namely Bag of Words (BoW) and Term Frequency-Inverse
Externí odkaz:
http://arxiv.org/abs/2010.07444
Data acquisition is an important process in the functioning of any control system. Usually, the acquired signal is analogic, representing a continuous physical measure, and it should be processed in a digital system based on an analog to digital conv
Externí odkaz:
http://arxiv.org/abs/1909.02447
Publikováno v:
Trustcom/BigDataSE/ISPA 2016: 1990-1997
Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use th
Externí odkaz:
http://arxiv.org/abs/1903.05791
In this paper, we show how practical the little theorem of witness functions is in detecting security flaws in some category of cryptographic protocols. We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witn
Externí odkaz:
http://arxiv.org/abs/1903.00499
Autor:
Fattahi, Jaouhar
Les protocoles cryptographiques constituent le coeur de la sécurité dans les communications de tous genres. Ils assurent l’authentification des agents, la confidentialité des données, leur intégrité, l’atomicité des biens et de l’argent,
Externí odkaz:
https://hdl.handle.net/20.500.11794/26678
Autor:
Fattahi, Jaouhar
In this paper, we enunciate the theorem of secrecy in tagged protocols using the theory of witness-functions and we run a formal analysis on a new tagged version of the Needham-Schroeder public-key protocol using this theorem. We discuss the signific
Externí odkaz:
http://arxiv.org/abs/1803.08151
Autor:
Pricop, Emil, Mihalache, Sanda Florentina, Paraschiv, Nicolae, Fattahi, Jaouhar, Zamfir, Florin
Publikováno v:
2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its fun
Externí odkaz:
http://arxiv.org/abs/1801.05459