Yassine Mekdad

Orcid: 0000-0003-3860-8057

According to our database1, Yassine Mekdad authored at least 14 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
IEEE Trans. Serv. Comput., 2024

A comprehensive security and performance assessment of UAV authentication schemes.
Secur. Priv., 2024

Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
CoRR, 2024

2023
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks.
IEEE Trans. Netw. Serv. Manag., June, 2023

A survey on security and privacy issues of UAVs.
Comput. Networks, April, 2023

Cryptocurrency wallets: assessment and security.
CoRR, 2023

2022
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security.
Dataset, March, 2022

Demystifying the Transferability of Adversarial Attacks in Computer Networks.
IEEE Trans. Netw. Serv. Manag., 2022

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks.
CoRR, 2022

Real or Virtual: A Video Conferencing Background Manipulation-Detection System.
CoRR, 2022

Detecting High-Quality GAN-Generated Face Images using Neural Networks.
CoRR, 2022

2021
Dataset for Real and Virtual Backgrounds of Video Calls.
Dataset, October, 2021

The Rise of ICS Malware: A Comparative Analysis.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

A threat model method for ICS malware: the TRISIS case.
Proceedings of the CF '21: Computing Frontiers Conference, 2021


  Loading...