Mejri, Mohamed
281  results:
Search for persons X
?
 
?
3

Beyond Data Collection: Safeguarding User Privacy in Social..:

, In: 2024 IEEE International Conference on Industrial Technology (ICIT),
 
?
 
?
5

Incident Detection Based on Differential Analysis:

Elseddig, Mohammed Ali ; Mejri, Mohamed
Journal of Information Security.  15 (2024)  3 - p. 378-409 , 2024
 
?
6

DIDOR: A Decentralized Identifier Based Onion Routing Proto..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Safe, Secure, Ethical, Responsible Technologies and Emerging Applications,
 
?
8

Error Resilience in Deep Neural Networks Using Neuron Gradi..:

Amarnath, Chandramouli ; Mejri, Mohamed ; Ma, Kwondo.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.  43 (2024)  4 - p. 1149-1162 , 2024
 
?
10

Impact of Feature Encoding on Malware Classification Explai..:

, In: 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI),
 
?
11

An Explainable Artificial Intelligence Approach for a Trust..:

, In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR),
 
?
12

MCM-CASR: Novel Alert Correlation Framework for Cyber Attac..:

, In: 2023 7th Cyber Security in Networking Conference (CSNet),
 
?
13

$$\mathbb {K}$$ Semantics for Security Policy Enforcement o..:

, In: Advances in Computational Intelligence and Communication; EAI/Springer Innovations in Communication and Computing,
 
?
14

$$\mathbb {K}$$-Smali: An Executable Semantics for Program ..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
15

Low Power Neural Network Accelerators Using Collaborative W..:

, In: 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS),
 
1-15