Skip to main content

Showing 1–7 of 7 results for author: Amara, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.06730  [pdf, ps, other

    cs.CR cs.AI

    Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning

    Authors: Rabah Rahal, Abdelaziz Amara Korba, Yacine Ghamri-Doudane

    Abstract: The rapid global adoption of electric vehicles (EVs) has established electric vehicle supply equipment (EVSE) as a critical component of smart grid infrastructure. While essential for ensuring reliable energy delivery and accessibility, EVSE systems face significant cybersecurity challenges, including network reconnaissance, backdoor intrusions, and distributed denial-of-service (DDoS) attacks. Th… ▽ More

    Submitted 7 June, 2025; originally announced June 2025.

  2. arXiv:2504.18814  [pdf, other

    cs.CR cs.AI

    Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization

    Authors: Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane

    Abstract: The Internet of Vehicles (IoV) is transforming transportation by enhancing connectivity and enabling autonomous driving. However, this increased interconnectivity introduces new security vulnerabilities. Bot malware and cyberattacks pose significant risks to Connected and Autonomous Vehicles (CAVs), as demonstrated by real-world incidents involving remote vehicle system compromise. To address thes… ▽ More

    Submitted 1 May, 2025; v1 submitted 26 April, 2025; originally announced April 2025.

  3. arXiv:2501.01664  [pdf, other

    cs.CR cs.AI

    BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

    Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane

    Abstract: The integration of Internet of Things (IoT) technology in various domains has led to operational advancements, but it has also introduced new vulnerabilities to cybersecurity threats, as evidenced by recent widespread cyberattacks on IoT devices. Intrusion detection systems are often reactive, triggered by specific patterns or anomalies observed within the network. To address this challenge, this… ▽ More

    Submitted 3 January, 2025; originally announced January 2025.

  4. arXiv:2310.03845  [pdf, other

    astro-ph.EP astro-ph.IM cs.LG

    Euclid: Identification of asteroid streaks in simulated images using deep learning

    Authors: M. Pöntinen, M. Granvik, A. A. Nucita, L. Conversi, B. Altieri, B. Carry, C. M. O'Riordan, D. Scott, N. Aghanim, A. Amara, L. Amendola, N. Auricchio, M. Baldi, D. Bonino, E. Branchini, M. Brescia, S. Camera, V. Capobianco, C. Carbone, J. Carretero, M. Castellano, S. Cavuoti, A. Cimatti, R. Cledassou, G. Congedo , et al. (92 additional authors not shown)

    Abstract: Up to 150000 asteroids will be visible in the images of the ESA Euclid space telescope, and the instruments of Euclid offer multiband visual to near-infrared photometry and slitless spectra of these objects. Most asteroids will appear as streaks in the images. Due to the large number of images and asteroids, automated detection methods are needed. A non-machine-learning approach based on the Strea… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Comments: 18 pages, 11 figures

    Journal ref: A&A 679, A135 (2023)

  5. Network representation learning systematic review: ancestors and current development state

    Authors: Amina Amara, Mohamed Ali Hadj Taieb, Mohamed Ben Aouicha

    Abstract: Real-world information networks are increasingly occurring across various disciplines including online social networks and citation networks. These network data are generally characterized by sparseness, nonlinearity and heterogeneity bringing different challenges to the network analytics task to capture inherent properties from network data. Artificial intelligence and machine learning have been… ▽ More

    Submitted 14 September, 2021; originally announced September 2021.

    Comments: 65 pages 11 Figures 6 Tables

    Journal ref: Machine Learning with Applications, Volume 6, 2021,100-130

  6. arXiv:2012.14816  [pdf, other

    cs.CR

    Analysis of the Scalability of a Deep-Learning Network for Steganography "Into the Wild"

    Authors: Hugo Ruiz, Marc Chaumont, Mehdi Yedroudj, Ahmed Oulad Amara, Frédéric Comby, Gérard Subsol

    Abstract: Since the emergence of deep learning and its adoption in steganalysis fields, most of the reference articles kept using small to medium size CNN, and learn them on relatively small databases. Therefore, benchmarks and comparisons between different deep learning-based steganalysis algorithms, more precisely CNNs, are thus made on small to medium databases. This is performed without knowing: 1.… ▽ More

    Submitted 29 December, 2020; originally announced December 2020.

    Comments: Proceeding of the 25th International Conference on Pattern Recognition, ICPR'2021, Worshop on MultiMedia FORensics in the WILD, MMForWILD'2021, Lecture Notes in Computer Science, LNCS, Springer, Virtual Conference due to Covid (formerly Milan, Italy), January 10-15, 2021, 14 pages, https://iplab.dmi.unict.it/mmforwild/. Also look at the associated video (youtube)

    Journal ref: Lecture Notes in Computer Science, LNCS, Springer, 2021

  7. arXiv:1410.4345  [pdf, ps, other

    astro-ph.IM cs.MS cs.PL physics.comp-ph

    HOPE: A Python Just-In-Time compiler for astrophysical computations

    Authors: Joel Akeret, Lukas Gamper, Adam Amara, Alexandre Refregier

    Abstract: The Python programming language is becoming increasingly popular for scientific applications due to its simplicity, versatility, and the broad range of its libraries. A drawback of this dynamic language, however, is its low runtime performance which limits its applicability for large simulations and for the analysis of large data sets, as is common in astrophysics and cosmology. While various fram… ▽ More

    Submitted 3 December, 2014; v1 submitted 16 October, 2014; originally announced October 2014.

    Comments: Accepted for publication in Astronomy and Computing. 14 pages, 1 figure. The code is available at http://hope.phys.ethz.ch