-
Opening Ceremony & Keynote 1
Done
-
Session S-38: Control Theory
Done
-
Session V-12: System Identification
Done
-
Session V-09: Cloud Computing and Wireless Systems
Done
-
Session V-20: Intelligent Control
Done
-
Session V-17: Nonlinear Systems
Done
-
Session S-48: Mobile, Wireless Communications, and Telecommunication Applications
Done
-
Session S-09: Graphs and Networks
Done
-
Session S-36: Robotics with Applications (Part 2)
Done
-
Session V-11: Monitoring and Supervision
Done
Session chair(s): Jaouhar Fattahi, Mohamed Mejri, Ridha Ghayoula, Emil Pricop
Paper ID | Title | Authors |
429 |
Intrusion Detection Explainability by Ensemble Learning with a Case Study |
Elyes Manai, Mohamed Mejri, Jaouhar Fattahi* (Canada) |
457 |
FingFor: A Deep Learning Tool for Biometric Forensics |
Jaouhar Fattahi*, Baha Eddine Lakdher, Mohamed Mejri, Ridha Ghayoula, Elyes Manai, Marwa Ziadia (Canada) |
461 |
Sexism Discovery Using CNN, Word Embeddings, NLP and Data Augmentation |
Jaouhar Fattahi*, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Sahbi Bahroun, Marwa Ziadia (Canada) |
465 |
Handwritten Signature Recognition Using Parallel CNNs and Transfer Learning for Forensics |
Jaouhar Fattahi*, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Emil Pricop, Baha Eddine Lakdher (Canada) |
194 |
Confusion Matrix Explainability to Improve Model Performance : Application to Network Intrusion Detection |
Elyes Manai, Mohamed Mejri, Jaouhar Fattahi* (Canada) |
475 |
The Good and Bad Seeds of CNN Parallelization in Forensic Facial Recognition |
Jaouhar Fattahi*, Baha Eddine Lakdher, Mohamed Mejri, Ridha Ghayoula, Feriel Sghaier, Laila Boumlik (Canada) |
492 |
Extended Group TOPSIS Method with Application for Cybersecurity |
Constanta Zoie Radulescu*, Marius Radulescu, Adrian Victor Vevera, Radu Boncea (Romania) |
755 |
Optimal and Secure Routing Protocol Based on Key Management for IoT |
Radhia Radhia khdhir, Salwa Othmen, Aymen Belghith*, Khaled Hamouid (Saudi Arabia) |