Marwa Ziadia

Orcid: 0000-0002-8563-4736

According to our database1, Marwa Ziadia authored at least 13 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Adaptive Regenerative Braking Strategy Design Based on Naturalistic Regeneration Performance for Intelligent Vehicles.
IEEE Access, 2023

2022
SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022

FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7.
Proceedings of the 14th International Conference on Electronics, 2022

2021
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Extreme Gradient Boosting for Cyberpropaganda Detection.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

2019
Using an Intelligent Vision System for Obstacle Detection in Winter Condition.
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019

2017
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

2015
Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.
Proceedings of the Codes, Cryptology, and Information Security, 2015


  Loading...