Seguir
Abderrazak JEMAI
Abderrazak JEMAI
Institut National des Sciences Appliquées et de Technologie
Dirección de correo verificada de insat.rnu.tn
Título
Citado por
Citado por
Año
A survey of IoT security based on a layered architecture of sensing and data analysis
H Mrabet, S Belguith, A Alhomoud, A Jemai
Sensors 20 (13), 3625, 2020
3302020
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Computer Networks 133, 141-156, 2018
1932018
Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns
M Nouiri, A Bekrar, A Jemai, D Trentesaux, AC Ammari, S Niar
Computers & industrial engineering 112, 595-606, 2017
1362017
A survey on the usage of blockchain technology for cyber-threats in the context of industry 4.0
SB ElMamy, H Mrabet, H Gharbi, A Jemai, D Trentesaux
Sustainability 12 (21), 9179, 2020
912020
Enhancing data security in cloud computing using a lightweight cryptographic algorithm
S Belguith, A Jemai, R Attia
11th International Conference on Autonomic and Autonomous Systems, 98-103, 2015
732015
A survey on security of IoT in the context of eHealth and clouds
IB Ida, A Jemai, A Loukil
2016 11th International Design & Test Symposium (IDT), 25-30, 2016
722016
Multi-objective evolutionary approach based on K-means clustering for home health care routing and scheduling problem
M Belhor, A El-Amraoui, A Jemai, F Delmotte
Expert Systems with Applications 213, 119035, 2023
462023
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Journal of Parallel and Distributed Computing 135, 1-20, 2020
452020
Pabac: a privacy preserving attribute based framework for fine grained access control in clouds
S Belguith, N Kaaniche, A Jemai, M Laurent, R Attia
SECRYPT 2016: 13th International Conference on Security and Cryptography 4 …, 2016
382016
Comparative study of the common cyber-physical attacks in industry 4.0
NE Oueslati, H Mrabet, A Jemai, A Alhomoud
2019 International Conference on Internet of Things, Embedded Systems and …, 2019
352019
Constant-size threshold attribute based signcryption for cloud applications
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
SECRYPT 2017: 14th International Conference on Security and Cryptography 6 …, 2017
352017
ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN
EK Zaghouani, A Jemai, A Benzina, R Attia
2015 23rd European signal processing conference (EUSIPCO), 81-85, 2015
342015
A hybrid genetic algorithm for Golomb ruler problem
N Ayari, T Van Luong, A Jemai
ACS/IEEE International Conference on Computer Systems and Applications …, 2010
292010
A new rescheduling heuristic for flexible job shop problem with machine disruption
M Nouiri, A Bekrar, A Jemai, AC Ammari, S Niar
Service Orientation in Holonic and Multi-Agent Manufacturing: Proceedings of …, 2018
172018
Study of key pre-distribution schemes in wireless sensor networks: case of BROSK (use of WSNet)
A Jemai, A Mastouri, H Eleuch
Applied Mathematics & Information Sciences 5 (3), 655-655, 2011
122011
Learning-Based Metaheuristic Approach for Home Healthcare Optimization Problem.
M Belhor, A El-Amraoui, A Jemai, F Delmotte
Comput. Syst. Sci. Eng. 45 (1), 1-19, 2023
112023
Performance improvement of the particle swarm optimisation algorithm for the flexible job shop problem under machines breakdown
R Zarrouk, IE Bennour, J Abderrazak
International Journal of Intelligent Engineering Informatics 6 (3-4), 396-416, 2018
102018
Assessment of data augmentation, dropout with L2 Regularization and differential privacy against membership inference attacks
S Ben Hamida, H Mrabet, F Chaieb, A Jemai
Multimedia Tools and Applications 83 (15), 44455-44484, 2024
92024
How Differential Privacy Reinforces Privacy of Machine Learning Models?
S Ben Hamida, H Mrabet, A Jemai
International Conference on Computational Collective Intelligence, 661-673, 2022
92022
Secure data outsourcing in presence of the inference problem: issues and directions
A Jebali, S Sassi, A Jemai
Journal of Information and Telecommunication 5 (1), 16-34, 2021
92021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20