Yacine Challal

Orcid: 0000-0002-9237-6210

According to our database1, Yacine Challal authored at least 133 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Hybrid Machine Learning Model for Code Optimization.
Int. J. Parallel Program., December, 2023

PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side.
J. Inf. Secur. Appl., September, 2023

Implementing a secure remote patient monitoring system.
Inf. Secur. J. A Glob. Perspect., January, 2023

Privacy-preserving remote deep-learning-based inference under constrained client-side environment.
J. Ambient Intell. Humaniz. Comput., 2023

Zero-Touch Security Management for mMTC Network Slices: DDoS Attack Detection and Mitigation.
IEEE Internet Things J., 2023

Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge Computing.
Proceedings of the International Conference on Software, 2023

SuperChain: Decentralized and Trustful Supervised Learning over Blockchain.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks.
J. Netw. Syst. Manag., 2022

Privacy preservation using game theory in e-health application.
J. Inf. Secur. Appl., 2022

A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices.
Comput. Commun., 2022

NRflex: Enforcing network slicing in 5G New Radio.
Comput. Commun., 2022

An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture.
Proceedings of the 30th International Conference on Software, 2022

Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Security Analysis and Evaluation of Optimized Authentication in Named Data Networking.
Proceedings of the Advances in Computing Systems and Applications, 2022

2021
Certificateless Public Key Systems Aggregation: An enabling technique for 5G multi-domain security management and delegation.
Comput. Networks, 2021

PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things.
J. Netw. Comput. Appl., 2020

Optimized in-network authentication against pollution attacks in software-defined-named data networking.
J. Inf. Secur. Appl., 2020

A review of privacy-preserving techniques for deep learning.
Neurocomputing, 2020

Privacy preservation for social networks sequential publishing.
Comput. Networks, 2020

A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

UAV mission optimization in 5G: On reducing MEC service relocation.
Proceedings of the IEEE Global Communications Conference, 2020

2019
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation.
IEEE Trans. Intell. Transp. Syst., 2019

Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019

Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

An Efficient Multi-Group Key Management Protocol for Heterogeneous IoT Devices.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Improved Key Graph based Key Management Scheme for Smart Grid AMI systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Android Malware Detection Based on System Calls Analysis and CNN Classification.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019

Cryptanalysis and Improvement of Identity-Based Multisignature Scheme.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Using ABE for Medical Data Protection in Fog Computing.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Single-Path Network Coding Authentication for Software-Defined Named Data Networking.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Security in device-to-device communications: a survey.
IET Networks, 2018

A roadmap for security challenges in the Internet of Things.
Digit. Commun. Networks, 2018

VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems.
Comput. Networks, 2018

Scalable Key Management for Elastic Security Domains in Fog Networks.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Private and efficient set intersection protocol for RFID-based food adequacy check.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

An Efficient Multi-Group Key Management Protocol for Internet of Things.
Proceedings of the 26th International Conference on Software, 2018

Privacy Preservation in Social Networks Sequential Publishing.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Peer-to-Peer Collaborative Video-on-Demand Streaming over Mobile Content Centric Networking.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Authenticated Network Coding for Software-Defined Named Data Networking.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Security and Privacy in Emerging Wireless Networks.
Secur. Commun. Networks, 2017

A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications.
Pervasive Mob. Comput., 2017

Using dynamic programming to solve the Wireless Sensor Network Configuration Problem.
J. Netw. Comput. Appl., 2017

Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Netw. Comput. Appl., 2017

Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards authenticated network coding for named data networking.
Proceedings of the 25th International Conference on Software, 2017

A Markov game privacy preserving model in retail applications.
Proceedings of the International Conference on Selected Topics in Mobile and Wireless Networking, 2017

Private and Efficient Set Intersection Protocol for Big Data Analytics.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Social Networks Privacy Preserving Data Publishing.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks.
Future Gener. Comput. Syst., 2016

MK-AMI: Efficient multi-group key management scheme for secure communications in AMI systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Novel Efficient and Privacy-Preserving Protocols for Sensor-Based Human Activity Recognition.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Threshold Yoking/Grouping Proofs Based on CP-ABE for IoT Applications.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Instantaneous Proxy-Based Key Update for CP-ABE.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Collaborative KP-ABE for cloud-based Internet of Things applications.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Internet of Things security and privacy: Design methods and optimization.
Ad Hoc Networks, 2015

An Efficient and Privacy-Preserving Similarity Evaluation for Big Data Analytics.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Poster: Activity-Based Access Control for IoT.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

Batch-based CP-ABE with attribute revocation mechanism for the Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Temperature MAC plug-in for large scale WSN.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Internet of things context-aware privacy architecture.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Efficient CP-ABE Attribute/Key Management for IoT Applications.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Scalable Multi-group Key Management for Advanced Metering Infrastructure.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Adaptive failure detection in low power lossy wireless sensor networks.
J. Netw. Comput. Appl., 2014

Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges.
IEEE Commun. Surv. Tutorials, 2014

Energy efficiency in wireless sensor networks: A top-down survey.
Comput. Networks, 2014

Energy-efficient architecture for wearable sensor networks.
Proceedings of the 2014 IFIP Wireless Days, 2014

Context-aware energy-efficient wireless sensor architecture for body activity recognition.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

A systemic and cognitive approach for IoT security.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

SMART: Secure Multi-pAths Routing for wireless sensor neTworks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Netw. Comput. Appl., 2013

Quadrotors Formation Control - A Wireless Medium Access Aware Approach.
J. Intell. Robotic Syst., 2013

Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks.
IEEE Commun. Lett., 2013

A new class of Hash-Chain based key pre-distribution schemes for WSN.
Comput. Commun., 2013

Multi-hop wireless charging optimization in low-power networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

ALLONE: A new adaptive failure detector model for Low-power Lossy Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

WSN lifetime optimization through controlled sink mobility and packet buffering.
Proceedings of the Global Information Infrastructure Symposium, 2013

A Systemic Approach for IoT Security.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Framework for Solving the Configuration Problem in Wireless Sensor Networks.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Braided Disjoint Branch Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Adaptive Group Key Management Protocol for Wireless Communications.
J. Univers. Comput. Sci., 2012

Efficient data aggregation with in-network integrity control for WSN.
J. Parallel Distributed Comput., 2012

Certification-based trust models in mobile ad hoc networks: A survey and taxonomy.
J. Netw. Comput. Appl., 2012

An efficient key management scheme for content access control for linear hierarchies.
Comput. Networks, 2012

A new weighted shortest path tree for convergecast traffic routing in WSN.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

A New Scalable Key Pre-Distribution Scheme for WSN.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Sécurité de l'Internet des Objets : vers une approche cognitive et systémique. (Internet of Things Security: towards cognitive and systemic approach).
, 2012

2011
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks.
J. Netw. Comput. Appl., 2011

Rehabilitation supervision using wireless sensor networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Efficient adaptive failure detection for Query/Response based wireless sensor networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Energy-Aware Network Configuration for Wireless Sensor Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Toward a high-fidelity wireless sensor network for rehabilitation supervision.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
A new worm propagation threat in BitTorrent: modeling and analysis.
Telecommun. Syst., 2010

Key management with host mobility in dynamic groups.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

An efficient and highly resilient key management scheme for wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

BiTIT: Throttling BitTorrent illegal traffic.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks.
Proceedings of the ARES 2010, 2010

2009
Reliable and fully distributed trust model for mobile ad hoc networks.
Comput. Secur., 2009

BitTorrent Worm Sensor Network : P2P Worms Detection and Containment.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

2008
Adaptive clustering for scalable key management in dynamic group communications.
Int. J. Secur. Networks, 2008

Scalable Delay-constrained Multicast Group Key Management.
Int. J. Netw. Secur., 2008

On security issues in embedded systems: challenges and solutions.
Int. J. Inf. Comput. Secur., 2008

HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
Key management for content access control in a hierarchy.
Comput. Networks, 2007

NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
S-DV: A new approach to Secure Distance Vector routing protocols.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

AAA based security architecture for multicast content distribution.
Proceedings of the International Symposium on Computer Networks, 2006

Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Group Communication Security. (Sécurité dans les communications de groupe).
PhD thesis, 2005

H<sub>2</sub>A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming.
Comput. Secur., 2005

RLH: receiver driven layered hash-chaining for multicast data origin authentication.
Comput. Commun., 2005

An Efficient Key Management Algorithm for Hierarchical Group Communication.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
A taxonomy of multicast data origin authentication: Issues and solutions.
IEEE Commun. Surv. Tutorials, 2004

SAKM: a scalable and adaptive key management approach for multicast communications.
Comput. Commun. Rev., 2004

A Scalable and Adaptive Key Management Protocol for Group Communication.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

A<sup>2</sup>cast: an adaptive source authentication protocol for multicast streams.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2002
AKMP: an adaptive key management protocol for secure multicast.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002


  Loading...