Search Results - "Ouni, Bassem"
-
1
Model-Driven Architectural Framework towards Safe and Secure Nuclear Power Reactors
Published in Sensors (Basel, Switzerland) (29-07-2021)“…Sensor-based digital systems for Instrumentation and Control (I&C) of nuclear reactors are quite complex in terms of architecture and functionalities. A…”
Get full text
Journal Article -
2
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
Published in IEEE access (2024)“…Monocular depth estimation (MDE) is an important task in scene understanding, and significant improvements in its performance have been witnessed with the…”
Get full text
Journal Article -
3
Cyber-Security of Embedded IoTs in Smart Homes: Challenges, Requirements, Countermeasures, and Trends
Published in IEEE open journal of vehicular technology (2023)“…Connected computers and sensors transmit data across the Internet to solve problems and generate new services (IoT). Smart homes use IoT, for example. Smart…”
Get full text
Journal Article -
4
Physical Adversarial Attacks for Camera-Based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Published in IEEE access (2023)“…Deep Neural Networks (DNNs) have shown impressive performance in computer vision tasks; however, their vulnerability to adversarial attacks raises concerns…”
Get full text
Journal Article -
5
Labeling strategy to improve neutron/gamma discrimination with organic scintillator
Published in Nuclear engineering and technology (01-11-2023)“…Organic scintillators are widely used for neutron/gamma detection. Pulse shape discrimination algorithms have been commonly used to discriminate the detected…”
Get full text
Journal Article -
6
Novel Model-Based approach for instrumentation and control of nuclear reactors
Published in EPJ Web of conferences (2021)“…Technological platforms dedicated for digital instrumentation and control of nuclear reactors are quite complex in terms of functionalities and devices. Hence,…”
Get full text
Journal Article -
7
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures
Published in Ad hoc networks (15-04-2022)“…Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors. They open doors to new opportunities for investors and business…”
Get full text
Journal Article -
8
Metaheuristic Algorithms for 6G wireless communications: Recent advances and applications
Published in Ad hoc networks (01-05-2024)“…The widespread distribution of intelligent applications and devices, coupled with the vast array of mobile data, technologies, and architectures within Sixth…”
Get full text
Journal Article -
9
Secure Federated Learning with Fully Homomorphic Encryption for IoT Communications
Published in IEEE internet of things journal (01-02-2024)“…The emergence of the Internet of Things (IoT) has revolutionized people's daily lives, providing superior quality services in cognitive cities, healthcare, and…”
Get full text
Journal Article -
10
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
Published in ICC 2023 - IEEE International Conference on Communications (28-05-2023)“…The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities,…”
Get full text
Conference Proceeding -
11
Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities
Published in IEEE internet of things journal (08-10-2024)“…Federated learning is a promising collaborative and privacy-preserving machine learning approach in data-rich smart cities. Nevertheless, the inherent…”
Get full text
Journal Article -
12
Labeling strategy to improve neutron/gamma discrimination with plastic scintillator using artificial neural network
Published in Nuclear engineering and technology (2023)“…Organic scintillators are widely used for neutron/gamma detection. Pulse shape discrimination algorithms have been commonly used to discriminate the detected…”
Get full text
Journal Article -
13
An Incremental Gray-Box Physical Adversarial Attack on Neural Network Training
Published in ICC 2023 - IEEE International Conference on Communications (28-05-2023)“…Neural networks have demonstrated remarkable success in learning and solving complex tasks in a variety of fields including cognitive cities. Nevertheless, the…”
Get full text
Conference Proceeding -
14
Multi-level energy/power-aware design methodology for MPSoC
Published in Journal of parallel and distributed computing (01-02-2017)“…Multiprocessor Systems-on-Chip (MPSoC) are becoming one of the most used solutions in order to meet the growing computation requirements of modern embedded…”
Get full text
Journal Article -
15
Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning
Published 20-11-2023“…This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things…”
Get full text
Journal Article -
16
Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Published 11-08-2023“…In this paper, we present a comprehensive survey of the current trends focusing specifically on physical adversarial attacks. We aim to provide a thorough…”
Get full text
Journal Article -
17
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
Published 06-08-2023“…In this paper, we investigate the vulnerability of MDE to adversarial patches. We propose a novel \underline{S}tealthy \underline{A}dversarial…”
Get full text
Journal Article -
18
Accurate energy characterization of OS services in embedded systems
Published in EURASIP journal on embedded systems (25-07-2012)“…As technology scales for increased circuit density and performance, the management of power consumption in embedded systems is becoming critical. Because the…”
Get full text
Journal Article -
19
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
Published 20-02-2023“…The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities,…”
Get full text
Journal Article -
20
SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications
Published 18-03-2024“…Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently,…”
Get full text
Journal Article