Hamza Kheddar
YOU?
Author Swipe
View article: Efficient Fine-Grained LuT-Based Optimization of AES MixColumns and InvMixColumns for FPGA Implementation
Efficient Fine-Grained LuT-Based Optimization of AES MixColumns and InvMixColumns for FPGA Implementation Open
This paper presents fine-grained Field Programmable Gate Arrays (FPGA) architectures for the Advanced Encryption Standard (AES) MixColumns and InvMixColumns transformations, targeting improved performance and resource utilization. The prop…
View article: A robust cross-domain IDS using BiGRU-LSTM-attention for medical and industrial IoT security
A robust cross-domain IDS using BiGRU-LSTM-attention for medical and industrial IoT security Open
The increased Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT) interconnectivity has introduced complex cybersecurity challenges, exposing sensitive data, patient safety, and industrial operations to advanced …
View article: Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis during Cyber Incident Response
Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis during Cyber Incident Response Open
Microsoft Windows is a widely deployed operating system, making forensic analysis, notably registry analysis, a common practice and central task in cyber incident response. However, the growing complexity of modern cyberattacks, the rapid …
View article: A Robust Cross-Domain IDS using BiGRU-LSTM-Attention for Medical and Industrial IoT Security
A Robust Cross-Domain IDS using BiGRU-LSTM-Attention for Medical and Industrial IoT Security Open
The increased Internet of Medical Things IoMT and the Industrial Internet of Things IIoT interconnectivity has introduced complex cybersecurity challenges, exposing sensitive data, patient safety, and industrial operations to advanced cybe…
View article: Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning
Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning Open
This article investigates the application of Deep Reinforcement Learning (DRL) for attributing malware to specific Advanced Persistent Threat (APT) groups through detailed behavioural analysis. By analysing over 3,500 malware samples from …
View article: A Systematic Analysis on the Use of AI Techniques in Industrial IoT DDoS Attacks Detection, Mitigation and Prevention
A Systematic Analysis on the Use of AI Techniques in Industrial IoT DDoS Attacks Detection, Mitigation and Prevention Open
Distributed Denial of Service (DDoS) attacks pose significant threats to Industrial Internet of Things (IIoT) environments, exacerbated by the resource constraints of IoT devices and the disruptive impact of such attacks. Conventional dete…
View article: Reinforced Residual Encoder–Decoder Network for Image Denoising via Deeper Encoding and Balanced Skip Connections
Reinforced Residual Encoder–Decoder Network for Image Denoising via Deeper Encoding and Balanced Skip Connections Open
Traditional image denoising algorithms often struggle with real-world complexities such as spatially correlated noise, varying illumination conditions, sensor-specific noise patterns, motion blur, and structural distortions. This paper pre…
View article: Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models
Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models Open
The rapid expansion of the industrial Internet of things (IIoT) has introduced new challenges in securing critical infrastructures against sophisticated cyberthreats. This study presents the development and evaluation of an advanced Intrus…
View article: Deep Learning-Based Coding Strategy for Improved Cochlear Implant Speech Perception in Noisy Environments
Deep Learning-Based Coding Strategy for Improved Cochlear Implant Speech Perception in Noisy Environments Open
Automatic speech recognition (ASR) and speech enhancement are essential tools in modern life, aiding not only in machine interaction but also in supporting individuals with hearing impairments. These processes begin with capturing speech i…
View article: Combined CNN-LSTM for Enhancing Clean and Noisy Speech Recognition
Combined CNN-LSTM for Enhancing Clean and Noisy Speech Recognition Open
This paper presents a hybrid Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM) approach for Automatic Speech Recognition (ASR) using deep learning techniques on the Aurora-2 dataset. The dataset includes both clean and multi-c…
View article: Improving Pretrained YAMNet for Enhanced Speech Command Detection via Transfer Learning
Improving Pretrained YAMNet for Enhanced Speech Command Detection via Transfer Learning Open
This work addresses the need for enhanced accuracy and efficiency in speech command recognition systems, a critical component for improving user interaction in various smart applications. Leveraging the robust pretrained YAMNet model and t…
View article: Enhancing Cochlear Implant Signal Coding with Scaled Dot-Product Attention
Enhancing Cochlear Implant Signal Coding with Scaled Dot-Product Attention Open
Cochlear implants (CIs) play a vital role in restoring hearing for individuals with severe to profound sensorineural hearing loss by directly stimulating the auditory nerve with electrical signals. While traditional coding strategies, such…
View article: Transfer Learning-Based Deep Residual Learning for Speech Recognition in Clean and Noisy Environments
Transfer Learning-Based Deep Residual Learning for Speech Recognition in Clean and Noisy Environments Open
Addressing the detrimental impact of non-stationary environmental noise on automatic speech recognition (ASR) has been a persistent and significant research focus. Despite advancements, this challenge continues to be a major concern. Recen…
View article: Deep Learning Techniques for Hand Vein Biometrics: A Comprehensive Review
Deep Learning Techniques for Hand Vein Biometrics: A Comprehensive Review Open
Biometric authentication has garnered significant attention as a secure and efficient method of identity verification. Among the various modalities, hand vein biometrics, including finger vein, palm vein, and dorsal hand vein recognition, …
View article: Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey Open
With significant advancements in Transformers LLMs, NLP has extended its reach into many research fields due to its enhanced capabilities in text generation and user interaction. One field benefiting greatly from these advancements is cybe…
View article: Deep Transfer Learning for Kidney Cancer Diagnosis
Deep Transfer Learning for Kidney Cancer Diagnosis Open
Incurable diseases continue to pose major challenges to global healthcare systems, with their prevalence shaped by lifestyle, economic, social, and genetic factors. Among these, kidney disease remains a critical global health issue, requir…
View article: Advancing 3D Point Cloud Understanding through Deep Transfer Learning: A Comprehensive Survey
Advancing 3D Point Cloud Understanding through Deep Transfer Learning: A Comprehensive Survey Open
The 3D point cloud (3DPC) has significantly evolved and benefited from the advance of deep learning (DL). However, the latter faces various issues, including the lack of data or annotated data, the existence of a significant gap between tr…
View article: Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems
Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems Open
Protecting Internet of things (IoT) devices against cyber attacks is imperative owing to inherent security vulnerabilities. These vulnerabilities can include a spectrum of sophisticated attacks that pose significant damage to both individu…
View article: Image and Point-cloud Classification for Jet Analysis in High-Energy Physics: A survey
Image and Point-cloud Classification for Jet Analysis in High-Energy Physics: A survey Open
Nowadays, there has been a growing trend in the field of high-energy physics (HEP), in both its experimental and phenomenological studies, to incorporate machine learning (ML) and its specialized branch, deep learning (DL). This review pap…
View article: Artificial Intelligence for Cochlear Implants: Review of Strategies, Challenges, and Perspectives
Artificial Intelligence for Cochlear Implants: Review of Strategies, Challenges, and Perspectives Open
Automatic speech recognition (ASR) plays a pivotal role in our daily lives, offering utility not only for interacting with machines but also for facilitating communication for individuals with partial or profound hearing impairments. The p…