Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Titouna, Chafiq
add a person with the name Titouna, Chafiq
 

Other publications of authors with the same name

A Lightweight Security Technique For Unmanned Aerial Vehicles Against GPS Spoofing Attack., and . IWCMC, page 819-824. IEEE, (2021)Asymmetric Byzantine Quorum Approach to Resolve Trust Issues in Decentralized Blockchain Oracles., , and . SoftCOM, page 1-6. IEEE, (2023)An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks., , and . WiMob, page 1-6. IEEE, (2020)Bacterial Foraging Optimization Scheme for Mobile Sensing in Wireless Sensor Networks., , , , , , and . Int. J. Wirel. Inf. Networks, 24 (3): 254-267 (2017)Efficient and Scalable ACO-Based Task Scheduling for Green Cloud Computing Environment., , , , and . SmartCloud, page 66-71. IEEE Computer Society, (2017)Robustness of Image-based Android Malware Detection Under Adversarial Attacks., , , and . ICC, page 1-6. IEEE, (2021)Securing Unmanned Aerial Systems Using Mobile Agents and Artificial Neural Networks., and . IWCMC, page 825-830. IEEE, (2021)Detecting False Data Injections in Images Collected by Drones: A Deep Learning Approach., , and . GLOBECOM, page 263-268. IEEE, (2022)A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems., and . ISCC, page 1-6. IEEE, (2022)Scalable Blockchain System for Load Balancing DNS Servers Using Heuristic Sharding., , and . BCCA, page 420-425. IEEE, (2023)