Akka Zemmari

According to our database1, Akka Zemmari authored at least 100 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Hybrid System for Defect Detection on Rail Lines through the Fusion of Object and Context Information.
Sensors, February, 2024

IFI: Interpreting for Improving: A Multimodal Transformer with an Interpretability Technique for Recognition of Risk Events.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

2023
Leveraging Explainability methods in Spectral Domain for Data Augmentation and efficient training of CNN classifiers for Covid-19 Detection.
Proceedings of the Twelfth International Conference on Image Processing Theory, 2023

Artificial Intelligence for Defence in an EQF6 Training and Education Program, from the Design to the Execution.
Proceedings of the IEEE Global Engineering Education Conference, 2023

Entropy-based Sampling for Streaming learning with Move-to-Data approach on Video.
Proceedings of the 20th International Conference on Content-based Multimedia Indexing, 2023

Distribution of the Training Data Over the Shortest Path Between the Servers.
Proceedings of the Advanced Information Networking and Applications, 2023

A Robust Drift Detection Algorithm with High Accuracy and Low False Positives Rate.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
Detection of Risky Situations for Frail Adults With Hybrid Neural Networks on Multimodal Health Data.
IEEE Multim., 2022

3D Convolutional Networks for Action Recognition: Application to Sport Gesture Recognition.
CoRR, 2022

A Hybrid Transformer Network for Detection of Risk Situations on Multimodal Life-Log Health Data.
Proceedings of the ICDAR@ICMR 2022: Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27, 2022

Partially Supervised Classification for Early Concept Drift Detection.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Pooling Transformer for Detection of Risk Events in In-The-Wild Video Ego Data.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

I Saw: A Self-Attention Weighted Method for Explanation of Visual Transformers.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Streaming learning with Move-to-Data approach for image classification.
Proceedings of the CBMI 2022: International Conference on Content-based Multimedia Indexing, Graz, Austria, September 14, 2022

Distributed Training from Multi-sourced Data.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Review of white box methods for explanations of convolutional neural networks in image classification tasks.
J. Electronic Imaging, 2021

White Box Methods for Explanations of Convolutional Neural Networks in Image Classification Tasks.
CoRR, 2021

Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Explaining 3D CNNs for Alzheimer's Disease Classification on sMRI Images with Multiple ROIs.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

A Hierarchical Classification System for the Detection of Covid-19 from Chest X-Ray Images.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

A GRU Neural Network with attention mechanism for detection of risk situations on multimodal lifelog data.
Proceedings of the 18th International Conference on Content-Based Multimedia Indexing, 2021

Downsampling Attack on Automatic Speaker Authentication System.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

Deep Neural Networks: Models and Methods.
Proceedings of the Multi-faceted Deep Learning - Models and Data, 2021

3D Convolutional Networks for Action Recognition: Application to Sport Gesture Recognition.
Proceedings of the Multi-faceted Deep Learning - Models and Data, 2021

Conclusion.
Proceedings of the Multi-faceted Deep Learning - Models and Data, 2021

2020
Deep Learning in Mining of Visual Content
Springer Briefs in Computer Science, Springer, ISBN: 978-3-030-34375-0, 2020

<i>SneakLeak+</i>: Large-scale klepto apps analysis.
Future Gener. Comput. Syst., 2020

Automated landmarking for insects morphometric analysis using deep neural networks.
Ecol. Informatics, 2020

Move-to-Data: A new Continual Learning approach with Deep CNNs, Application for image-class recognition.
CoRR, 2020

EspyDroid+: Precise reflection analysis of android apps.
Comput. Secur., 2020

SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
Comput. Commun., 2020

Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020

On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning.
Proceedings of the NOMS 2020, 2020

Features Understanding in 3D CNNs for Actions Recognition in Video.
Proceedings of the Tenth International Conference on Image Processing Theory, 2020

2019
Counting in one-hop beeping networks.
Theor. Comput. Sci., 2019

Design patterns in beeping algorithms: Examples, emulation, and analysis.
Inf. Comput., 2019

A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019

Network Intrusion Detection for IoT Security Based on Learning Techniques.
IEEE Commun. Surv. Tutorials, 2019

Deterministic Leader Election Takes Θ(D+log n) Bit Rounds.
Algorithmica, 2019

Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

2018
SWORD: Semantic aWare andrOid malwaRe Detector.
J. Inf. Secur. Appl., 2018

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks.
Comput. Commun., 2018

Landmarks Detection by Applying Deep Networks.
Proceedings of the 1st International Conference on Multimedia Analysis and Pattern Recognition, 2018

WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning Techniques.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Increasing Training Stability for Deep CNNS.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Privacy Preserving Data Offloading Based on Transformation.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Prediction of visual attention with deep CNN on artificially degraded videos for studies of attention of patients with Dementia.
Multim. Tools Appl., 2017

Android inter-app communication threats and detection techniques.
Comput. Secur., 2017

SneakLeak: Detecting Multipartite Leakage Paths in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Detecting Inter-App Information Leakage Paths.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Deep Saliency: Prediction of Interestingness in Video with CNN.
Proceedings of the Visual Content Indexing and Retrieval with Psycho-Visual Models, 2017

2016
Randomised distributed MIS and colouring algorithms for rings with oriented edges in O(√(log n)) bit rounds.
Inf. Comput., 2016

A distributed enumeration algorithm and applications to all pairs shortest paths, diameter...
Inf. Comput., 2016

RDA: A Coq Library to Reason about Randomised Distributed Algorithms in the Message Passing Model.
Sci. Ann. Comput. Sci., 2016

Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016

Deterministic Leader Election in O(D+\log n) Time with Messages of Size O(1).
Proceedings of the Distributed Computing - 30th International Symposium, 2016

MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks.
Proceedings of the 2016 Wireless Days, 2016

Design Patterns in Beeping Algorithms.
Proceedings of the 20th International Conference on Principles of Distributed Systems, 2016

Certified Impossibility Results and Analyses in Coq of Some Randomised Distributed Algorithms.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2016, 2016

MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

A Fault-Tolerant Handshake Algorithm for Local Computations.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Intersection Automata Based Model for Android Application Collusion.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Analysis of fully distributed splitting and naming probabilistic procedures and applications.
Theor. Comput. Sci., 2015

Lightweight secure group communications for resource constrained devices.
Int. J. Space Based Situated Comput., 2015

On Distributed Computing with Beeps.
CoRR, 2015

Election algorithms with random delays in trees.
CoRR, 2015

DRACO: DRoid analyst combo an android malware analysis framework.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

A Totally Distributed Fair Scheduler for Population Protocols by Randomized Handshakes.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015

2014
On Lower Bounds for the Time and the Bit Complexity of Some Probabilistic Distributed Graph Algorithms - (Extended Abstract).
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Greedy Flooding in Redoubtable Sensor Networks.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
On the time and the bit complexity of distributed randomised anonymous ring colouring.
Theor. Comput. Sci., 2013

Optimal bit complexity randomised distributed MIS and maximal matching algorithms for anonymous rings.
Inf. Comput., 2013

Randomized broadcasting in wireless mobile sensor networks.
Concurr. Comput. Pract. Exp., 2013

Analysis of Fully Distributed Splitting and Naming Probabilistic Procedures and Applications - (Extended Abstract).
Proceedings of the Structural Information and Communication Complexity, 2013

Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2011
An optimal bit complexity randomized distributed MIS algorithm.
Distributed Comput., 2011

2010
Sublinear Fully Distributed Partition with Applications.
Theory Comput. Syst., 2010

About randomised distributed graph colouring and graph partition algorithms.
Inf. Comput., 2010

Uniform election in trees and polyominoids.
Discret. Appl. Math., 2010

Broadcast in wireless mobile sensor networks with population protocols and extension with the rendezvous model.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

2009
An Optimal Bit Complexity Randomized Distributed MIS Algorithm (Extended Abstract).
Proceedings of the Structural Information and Communication Complexity, 2009

Brief Annoucement: Analysis of an Optimal Bit Complexity Randomised Distributed Vertex Colouring Algorithm.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009

Présentation et analyse de quelques algorithmes distribués probabilistes. (Presentation and analysis of some distributed randomized algorithms).
, 2009

2008
On handshakes in random graphs.
Inf. Process. Lett., 2008

2007
A Generic Distributed Algorithm for Computing by Random Mobile Agents.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

A Self-stabilizing Distributed Algorithm for Resolving Conflicts.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Merging Time of Random Mobile Agents.
Proceedings of the Dynamics in Logistics, First International Conference, 2007

2006
Broadcast in the rendezvous model.
Inf. Comput., 2006

Fast distributed graph partition and application.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
Locally guided randomized elections in trees: The totally fair case.
Inf. Comput., 2005

2003
The compactness of adaptive routing tables.
J. Discrete Algorithms, 2003

Analysis of a randomized rendezvous algorithm.
Inf. Comput., 2003

A uniform randomized election in trees.
Proceedings of the SIROCCO 10: Proceedings of the 10th Internaltional Colloquium on Structural Information Complexity, 2003

2002
Randomized local elections.
Inf. Process. Lett., 2002

2000
Contribution à l'analyse d'algorithmes distribués. (Contribution to the analysis of distributed algorithms).
PhD thesis, 2000


  Loading...