Skip to main content

Showing 1–19 of 19 results for author: Kaaniche, M

.
  1. arXiv:2412.16739  [pdf, other

    cs.CV

    UNEM: UNrolled Generalized EM for Transductive Few-Shot Learning

    Authors: Long Zhou, Fereshteh Shakeri, Aymen Sadraoui, Mounir Kaaniche, Jean-Christophe Pesquet, Ismail Ben Ayed

    Abstract: Transductive few-shot learning has recently triggered wide attention in computer vision. Yet, current methods introduce key hyper-parameters, which control the prediction statistics of the test batches, such as the level of class balance, affecting performances significantly. Such hyper-parameters are empirically grid-searched over validation data, and their configurations may vary substantially w… ▽ More

    Submitted 11 April, 2025; v1 submitted 21 December, 2024; originally announced December 2024.

    Comments: Accepted by CVPR2025

  2. A Neural Network based Framework for Effective Laparoscopic Video Quality Assessment

    Authors: Zohaib Amjad Khan, Azeddine Beghdadi, Mounir Kaaniche, Faouzi Alaya Cheikh, Osama Gharbi

    Abstract: Video quality assessment is a challenging problem having a critical significance in the context of medical imaging. For instance, in laparoscopic surgery, the acquired video data suffers from different kinds of distortion that not only hinder surgery performance but also affect the execution of subsequent tasks in surgical navigation and robotic surgeries. For this reason, we propose in this paper… ▽ More

    Submitted 14 April, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

  3. Residual Networks based Distortion Classification and Ranking for Laparoscopic Image Quality Assessment

    Authors: Zohaib Amjad Khan, Azeddine Beghdadi, Mounir Kaaniche, Faouzi Alaya Cheikh

    Abstract: Laparoscopic images and videos are often affected by different types of distortion like noise, smoke, blur and nonuniform illumination. Automatic detection of these distortions, followed generally by application of appropriate image quality enhancement methods, is critical to avoid errors during surgery. In this context, a crucial step involves an objective assessment of the image quality, which i… ▽ More

    Submitted 12 June, 2021; originally announced June 2021.

    Comments: 5 Pages, ICIP 2020

  4. Towards a Video Quality Assessment based Framework for Enhancement of Laparoscopic Videos

    Authors: Zohaib Amjad Khan, Azeddine Beghdadi, Faouzi Alaya Cheikh, Mounir Kaaniche, Egidijus Pelanis, Rafael Palomar, Åsmund Avdem Fretland, Bjørn Edwin, Ole Jakob Elle

    Abstract: Laparoscopic videos can be affected by different distortions which may impact the performance of surgery and introduce surgical errors. In this work, we propose a framework for automatically detecting and identifying such distortions and their severity using video quality assessment. There are three major contributions presented in this work (i) a proposal for a novel video enhancement framework f… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

    Comments: SPIE Medical Imaging 2020 (Draft version)

    Journal ref: Proc. SPIE 11316, Medical Imaging 2020: Image Perception, Observer Performance, and Technology Assessment, 113160P (2020)

  5. arXiv:1811.03934  [pdf, other

    cs.CR cs.NI

    RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

    Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre

    Abstract: Internet-of-Things (IoT) devices are nowadays massively integrated in daily life: homes, factories, or public places. This technology offers attractive services to improve the quality of life as well as new economic markets through the exploitation of the collected data. However, these connected objects have also become attractive targets for attackers because their current security design is ofte… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Journal ref: International Symposium on Network Computing and Applications - IEEE-NCA 2018, Nov 2018, Cambridge, Massachusetts, United States. 2018

  6. Specification-Based Protocol Obfuscation

    Authors: Julien Duchene, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic

    Abstract: This paper proposes a new obfuscation technique of a communication protocol that is aimed at making the reverse engineering of the protocol more complex. The obfuscation is based on the transformation of protocol message format specification. The obfuscating transformations are applied to the Abstract Syntax Tree (AST) representation of the messages and mainly concern the ordering or aggregation o… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Journal ref: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2018, Luxembourg City, France. IEEE, 2018

  7. arXiv:1803.08410  [pdf, other

    cs.CV

    A Smoke Removal Method for Laparoscopic Images

    Authors: Congcong Wang, Faouzi Alaya Cheikh, Mounir Kaaniche, Ole Jacob Elle

    Abstract: In laparoscopic surgery, image quality can be severely degraded by surgical smoke, which not only introduces error for the image processing (used in image guided surgery), but also reduces the visibility of the surgeons. In this paper, we propose to enhance the laparoscopic images by decomposing them into unwanted smoke part and enhanced part using a variational approach. The proposed method relie… ▽ More

    Submitted 22 March, 2018; originally announced March 2018.

  8. arXiv:1610.04725  [pdf, ps, other

    cs.CV

    Incremental One-Class Models for Data Classification

    Authors: Takoua Kefi, Riadh Ksantini, M. Becha Kaaniche, Adel Bouhoula

    Abstract: In this paper we outline a PhD research plan. This research contributes to the field of one-class incremental learning and classification in case of non-stationary environments. The goal of this PhD is to define a new classification framework able to deal with very small learning dataset at the beginning of the process and with abilities to adjust itself according to the variability of the incomin… ▽ More

    Submitted 15 October, 2016; originally announced October 2016.

    Comments: 4 pages, accepted in PhD Forum Session of the ECML-PKDD 2016

  9. A Model for Safety Case Confidence Assessment

    Authors: Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaaniche

    Abstract: Building a safety case is a common approach to make expert judgement explicit about safety of a system. The issue of confidence in such argumentation is still an open research field. Providing quantitative estimation of confidence is an interesting approach to manage complexity of arguments. This paper explores the main current approaches, and proposes a new model for quantitative confidence estim… ▽ More

    Submitted 20 November, 2015; originally announced December 2015.

    Journal ref: 34th International Conference on Computer Safety, Reliability and Security, Sep 2015, Delft, Netherlands. Springer, Lecture Notes in Computer Science, Vol. 9337, Programming and Software Engineering, Springer, 2015, http://safecomp2015.tudelft.nl/

  10. arXiv:1211.5738  [pdf

    cs.PF

    Modeling the resilience of large and evolving systems

    Authors: Mohamed Kaaniche, Paolo Lollini, Andrea Bondavalli, Karama Kanoun

    Abstract: This paper summarizes the state of knowledge and ongoing research on methods and techniques for resilience evaluation, taking into account the resilience-scaling challenges and properties related to the ubiquitous computerized systems. We mainly focus on quantitative evaluation approaches and, in particular, on model-based evaluation techniques that are commonly used to evaluate and compare, from… ▽ More

    Submitted 25 November, 2012; originally announced November 2012.

    Journal ref: International Journal of Performability Engineering 4, 2 (2008) 153-168

  11. arXiv:1211.5736  [pdf

    cs.PF

    Critical Utility Infrastructural Resilience

    Authors: Giovanna Dondossola, Geert Deconinck, Felicita Di Giandomenico, Susanna Donatelli, Mohamed Kaaniche, Paulo Verissimo

    Abstract: The paper refers to CRUTIAL, CRitical UTility InfrastructurAL Resilience, a European project within the research area of Critical Information Infrastructure Protection, with a specific focus on the infrastructures operated by power utilities, widely recognized as fundamental to national and international economy, security and quality of life. Such infrastructures faced with the recent market dereg… ▽ More

    Submitted 25 November, 2012; originally announced November 2012.

    Journal ref: International Workshop on Complex Network and Infrastructure Protection (CNIP-06), Rome : Italy (2006)

  12. arXiv:0809.4109  [pdf

    cs.SE

    Software dependability modeling using an industry-standard architecture description language

    Authors: Ana-Elena Rugina, Peter H. Feiler, Karama Kanoun, Mohamed Kaaniche

    Abstract: Performing dependability evaluation along with other analyses at architectural level allows both making architectural tradeoffs and predicting the effects of architectural decisions on the dependability of an application. This paper gives guidelines for building architectural dependability models for software systems using the AADL (Architecture Analysis and Design Language). It presents reusabl… ▽ More

    Submitted 24 September, 2008; originally announced September 2008.

  13. arXiv:0809.4108  [pdf

    cs.SE

    The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation

    Authors: Ana E. Rugina, Karama Kanoun, Mohamed Kaaniche

    Abstract: ADAPT is a tool that aims at easing the task of evaluating dependability measures in the context of modern model driven engineering processes based on AADL (Architecture Analysis and Design Language). Hence, its input is an AADL architectural model annotated with dependability-related information. Its output is a dependability evaluation model in the form of a Generalized Stochastic Petri Net (G… ▽ More

    Submitted 24 September, 2008; originally announced September 2008.

    Comments: 6 pages

    Journal ref: 7th European Dependable Computing Conference (EDCC), Kaunas : Lituanie (2008)

  14. arXiv:0809.4107  [pdf

    cs.DC

    Modelling interdependencies between the electricity and information infrastructures

    Authors: Jean-Claude Laprie, Karama Kanoun, Mohamed Kaaniche

    Abstract: The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the associated information infrastructure. The interdependencies of these two infrastructures are increasing due to a growing connection of the power grid networks to the global information infrastructure, as a consequence of… ▽ More

    Submitted 24 September, 2008; originally announced September 2008.

    Journal ref: 26th International Conference on Computer Safety, Reliability and Security, SAFECOMP-2007, Nurenberg : Allemagne (2007)

  15. arXiv:0704.0879  [pdf

    cs.PF

    A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture

    Authors: Mohamed Kaaniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar Iyer, Rick Karcich

    Abstract: We present a hierarchical simulation approach for the dependability analysis and evaluation of a highly available commercial cache-based RAID storage system. The archi-tecture is complex and includes several layers of overlap-ping error detection and recovery mechanisms. Three ab-straction levels have been developed to model the cache architecture, cache operations, and error detection and recov… ▽ More

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: Proc. 28th IEEE International Symposium on Fault-Tolerant Computing (FTCS-28), Munich (Germany), IEEE Computer Society, June 1998, pp.6-15 (1998) 6-15

  16. arXiv:0704.0865  [pdf

    cs.PF cs.SE

    An architecture-based dependability modeling framework using AADL

    Authors: Ana-Elena Rugina, Karama Kanoun, Mohamed Kaaniche

    Abstract: For efficiency reasons, the software system designers' will is to use an integrated set of methods and tools to describe specifications and designs, and also to perform analyses such as dependability, schedulability and performance. AADL (Architecture Analysis and Design Language) has proved to be efficient for software architecture modeling. In addition, AADL was designed to accommodate several… ▽ More

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: Proc. 10th IASTED International Conference on Software Engineering and Applications (SEA'2006), Dallas (USA), 13-15 November2006 (13/11/2006) 222-227

  17. arXiv:0704.0861  [pdf

    cs.PF cs.CR

    Empirical analysis and statistical modeling of attack processes based on honeypots

    Authors: Mohamed Kaaniche, Y. Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette

    Abstract: Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected from the honeypots. This paper presents some empirical analyses based on the da… ▽ More

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006) (25/06/2006) 119-124

  18. arXiv:0704.0860  [pdf

    cs.PF

    Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study

    Authors: Cristina Simache, Mohamed Kaaniche

    Abstract: This paper presents a measurement-based availability assessment study using field data collected during a 4-year period from 373 SunOS/Solaris Unix workstations and servers interconnected through a local area network. We focus on the estimation of machine uptimes, downtimes and availability based on the identification of failures that caused total service loss. Data corresponds to syslogd event… ▽ More

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: Proc. 2005 IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'2005), Changsha, Hunan (Chine), 12-14 D{é}cembre 2005 (18/12/2005) 49-56

  19. arXiv:0704.0858  [pdf

    cs.CR

    Lessons Learned from the deployment of a high-interaction honeypot

    Authors: Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb

    Abstract: This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of lowinteraction honeypots.

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: Proc. 6th European Dependable Computing Conference (EDCC-6), Coimbra (Portugal), 18-20 octobre 2006 (18/10/2006) 39-44