Maher Khemakhem

Orcid: 0000-0002-1287-1634

Affiliations:
  • University of King Abdulaziz, College of Computing and Information Technology, Jeddah, Saudi Arabia
  • University of Sfax, Tunisia


According to our database1, Maher Khemakhem authored at least 48 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Offline Text-Independent Arabic and Chinese Writer Identification Using a Multi-Segmentation Codebook-Based Strategy.
Proceedings of the 13th International Conference on Pattern Recognition Applications and Methods, 2024

2023
Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture.
IEEE Trans. Intell. Transp. Syst., November, 2023

Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection in Smart Grid Networks.
Sensors, September, 2023

Deep Reinforcement Learning for Workload Prediction in Federated Cloud Environments.
Sensors, August, 2023

Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car.
IEEE Access, 2023

2021
A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent.
Symmetry, 2021

2020
Parallel Hybrid Testing Techniques for the Dual-Programming Models-Based Programs.
Symmetry, 2020

XtremDew: a platform for cooperative tasks and data schedulers.
Int. J. High Perform. Comput. Netw., 2020

ACC_TEST: Hybrid Testing Approach for OpenACC-Based Programs.
IEEE Access, 2020

ACC_TEST: Hybrid Testing Techniques for MPI-Based Programs.
IEEE Access, 2020

2019
Bridging Education and Labor Skills by a Novel Competency-Based Course Linked-Data Model.
IEEE Access, 2019

The P2P-Grid-Agent Distributed Platform: A Distributed and Dynamic Platform for Developing and Executing Large-Scale Application Based on Deep Learning Techniques.
Proceedings of the Intelligent Decision Technologies 2019, 2019

Data protection in cloud computing: A Survey of the State-of-Art.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Towards a Better Security in Public Cloud Computing.
Proceedings of the Hybrid Intelligent Systems, 2019

A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Energy management strategy in cloud computing: a perspective study.
J. Supercomput., 2018

Complementary approaches built as web service for arabic handwriting OCR systems via amazon elastic mapreduce (EMR) model.
Int. Arab J. Inf. Technol., 2018

Added Values of Linked Data in Education: A Survey and Roadmap.
Comput., 2018

An Architecture for Translating Sequential Code to Parallel.
Proceedings of the 2nd International Conference on Information System and Data Mining, 2018

Improving Performance of Robust and Efficient E-Learning Platform Using Distributed Computing Technologies for Saudi Arabia's Institutes.
Proceedings of the 28th International Conference on Computer Theory and Applications, 2018

2017
Advanced distributed architecture for a complex and large scale Arabic handwriting recognition framework.
Int. J. High Perform. Comput. Netw., 2017

Pollution Attacks Identification in Structured P2P Overlay Networks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

Co-scheduling Data and Task for a Data-Driven Distribution of Data-Intensive Applications.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

An Open Tool Architecture for Security Testing of NoSQL-Based Applications.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
A novel replication technique to attenuate churn effects.
Peer-to-Peer Netw. Appl., 2016

A fedearted E-learning cloud system based on mixed reality.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

Universal metadata repository for document analysis and recognition.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
A model-based approach to offline text-independent Arabic writer identification and verification.
Pattern Recognit., 2015

2014
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

Sybil Nodes as a Mitigation Strategy Against Sybil Attack.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
Baseline Estimation in Arabic Handwritten Text-Line - Evaluation on AHTID/MW Database.
Proceedings of the ICPRAM 2013, 2013

Database for Arabic Printed Text Recognition Research.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013

Securing Structured P2P Overlay Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A Comparative study of Arabic handwritten characters invariant feature
CoRR, 2012

Mitigation of Sybil Attacks in Structured P2P Overlay Networks.
Proceedings of the Eighth International Conference on Semantics, Knowledge and Grids, 2012

Scheduling Data on Data-Driven Master/Worker Platform.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

A Database for Arabic Handwritten Text Image Recognition and Writer Identification.
Proceedings of the 2012 International Conference on Frontiers in Handwriting Recognition, 2012

Arabic Writer Identification and Verification Using Template Matching Analysis of Texture.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2010
Towards trusted volunteer grid environments
CoRR, 2010

2009
Towards a distributed Arabic OCR based on the DTW algorithm: performance analysis.
Int. Arab J. Inf. Technol., 2009

A novel approach for off-line Arabic writer identification based on stroke feature combination.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

PKI and UDDI based trust centre: An attempt to improve web service security.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

An Effective Combination of MPP Contour-Based Features for Off-Line Text-Independent Arabic Writer Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2009

Identity federation based on agent technology for secure large scale data storage and processing over volunteer grids.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Towards an agent based framework for the design of secure web services.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

2005
A multipurpose multi-agent system based on a loosely coupled architecture to speedup the DTW algorithm for Arabic printed cursive OCR.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Performance Evaluation of a Multi-Agent Framework for Multiple Document Processing.
Proceedings of the 2nd International Conference Computing, 2004


  Loading...