Najwa Aaraj

Orcid: 0000-0001-8782-5192

According to our database1, Najwa Aaraj authored at least 25 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities.
IEEE Trans. Cloud Comput., 2023

NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher.
IACR Cryptol. ePrint Arch., 2023

FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC.
IACR Cryptol. ePrint Arch., 2023

Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses.
CoRR, 2023

ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version).
CoRR, 2023

2022
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems.
IEEE Trans. Emerg. Top. Comput., 2022

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems Based on Machine Learning.
IEEE Trans. Emerg. Top. Comput., 2022

Finding and Evaluating Parameters for BGV.
IACR Cryptol. ePrint Arch., 2022

Survey on Fully Homomorphic Encryption, Theory, and Applications.
IACR Cryptol. ePrint Arch., 2022

Farasha: A Provable Permutation-based Parallelizable PRF.
IACR Cryptol. ePrint Arch., 2022

ML-FEED: Machine Learning Framework for Efficient Exploit Detection.
Proceedings of the 4th IEEE International Conference on Trust, 2022

GPU4SNN: GPU-Based Acceleration for Spiking Neural Network Simulations.
Proceedings of the Parallel Processing and Applied Mathematics, 2022

Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

2021
Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021

2017
MILP-aided Cryptanalysis of Round Reduced ChaCha.
IACR Cryptol. ePrint Arch., 2017

2012
INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment.
ACM Trans. Embed. Comput. Syst., 2012

2011
A framework for defending embedded systems against software attacks.
ACM Trans. Embed. Comput. Syst., 2011

2008
Analysis and design of a hardware/software trusted platform module for embedded systems.
ACM Trans. Embed. Comput. Syst., 2008

Dynamic Binary Instrumentation-Based Framework for Malware Defense.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Hybrid Architectures for Efficient and Secure Face Authentication in Embedded Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2007

Energy and execution time analysis of a software-based trusted platform module.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

2006
Architectures for efficient face authentication in embedded systems.
Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, 2006

2005
Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Transient Current Testing of Dynamic CMOS Circuits.
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004


  Loading...