Picture for Yacine Ghamri-Doudane

Yacine Ghamri-Doudane

Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning

Add code
Jun 07, 2025
Viaarxiv icon

Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization

Add code
Apr 26, 2025
Figure 1 for Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization
Figure 2 for Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization
Figure 3 for Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization
Figure 4 for Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization
Viaarxiv icon

VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning

Add code
Jan 08, 2025
Figure 1 for VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning
Figure 2 for VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning
Figure 3 for VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning
Figure 4 for VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning
Viaarxiv icon

AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning

Add code
Jan 08, 2025
Figure 1 for AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning
Figure 2 for AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning
Figure 3 for AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning
Figure 4 for AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning
Viaarxiv icon

BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

Add code
Jan 03, 2025
Figure 1 for BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction
Figure 2 for BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction
Figure 3 for BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction
Figure 4 for BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction
Viaarxiv icon

Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks

Add code
Aug 26, 2024
Viaarxiv icon

A Life-long Learning Intrusion Detection System for 6G-Enabled IoV

Add code
Jul 22, 2024
Figure 1 for A Life-long Learning Intrusion Detection System for 6G-Enabled IoV
Figure 2 for A Life-long Learning Intrusion Detection System for 6G-Enabled IoV
Figure 3 for A Life-long Learning Intrusion Detection System for 6G-Enabled IoV
Figure 4 for A Life-long Learning Intrusion Detection System for 6G-Enabled IoV
Viaarxiv icon

AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach

Add code
Jul 22, 2024
Figure 1 for AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach
Figure 2 for AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach
Figure 3 for AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach
Figure 4 for AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach
Viaarxiv icon

Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV

Add code
Jul 03, 2024
Figure 1 for Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
Figure 2 for Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
Figure 3 for Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
Figure 4 for Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
Viaarxiv icon

Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI

Add code
Jul 03, 2024
Figure 1 for Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI
Figure 2 for Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI
Figure 3 for Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI
Figure 4 for Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI
Viaarxiv icon