default search action
Naima Kaabouch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j39]Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, Naima Kaabouch:
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks. Future Internet 16(1): 32 (2024) - [j38]Amrita Das, Sattar Dorafshan, Naima Kaabouch:
Autonomous Image-Based Corrosion Detection in Steel Structures Using Deep Learning. Sensors 24(11): 3630 (2024) - [j37]Jack Burbank, Trevor Greene, Naima Kaabouch:
Detecting and Mitigating Attacks on GPS Devices. Sensors 24(17): 5529 (2024) - 2023
- [j36]Mohammad Nayfeh, Yuchen Li, Khair Al Shamaileh, Vijay Kumar Devabhaktuni, Naima Kaabouch:
Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification. Comput. Secur. 126: 103085 (2023) - [j35]Amal Naitali, Mohammed Ridouani, Fatima Salahdine, Naima Kaabouch:
Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions. Comput. 12(10): 216 (2023) - [j34]Tala Talaei Khoei, Naima Kaabouch:
Machine Learning: Models, Challenges, and Research Directions. Future Internet 15(10): 332 (2023) - [j33]Tala Talaei Khoei, Naima Kaabouch:
A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. Inf. 14(2): 103 (2023) - [j32]Abdelali Hadir, Naima Kaabouch, Mohammed-Alamine El Houssaini, Jamal El Kafi:
Range-Free Localization Approaches Based on Intelligent Swarm Optimization for Internet of Things. Inf. 14(11): 592 (2023) - [j31]Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch:
Deep learning: systematic review, models, challenges, and research directions. Neural Comput. Appl. 35(31): 23103-23124 (2023) - 2022
- [j30]Khaoula Belhaj Soulami, Naima Kaabouch, Mohamed Nabil Saidi:
Breast cancer: Classification of suspicious regions in digital mammograms based on capsule network. Biomed. Signal Process. Control. 76: 103696 (2022) - [j29]Khaoula Belhaj Soulami, Naima Kaabouch, Mohamed Nabil Saidi:
Breast cancer: Three-class masses classification in mammograms using Apriori dynamic selection. Concurr. Comput. Pract. Exp. 34(24) (2022) - [j28]Tala Talaei Khoei, Shereen Ismail, Naima Kaabouch:
Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs. Sensors 22(2): 662 (2022) - 2021
- [j27]Khaoula Belhaj Soulami, Naima Kaabouch, Mohamed Nabil Saidi, Ahmed Tamtaoui:
Breast cancer: One-stage automated detection, segmentation, and classification of digital mammograms using UNet model based-semantic segmentation. Biomed. Signal Process. Control. 66: 102481 (2021) - 2020
- [j26]Tarek Elderini, Naima Kaabouch, Jeremiah Neubert:
Space Occupancy Representation Based on A Bayesian Model for Unmanned Aerial Vehicles. J. Intell. Robotic Syst. 97(2): 399-410 (2020) - [j25]Khaoula Belhaj Soulami, Naima Kaabouch, Mohamed Nabil Saidi, Ahmed Tamtaoui:
An evaluation and ranking of evolutionary algorithms in segmenting abnormal masses in digital mammograms. Multim. Tools Appl. 79(27-28): 18941-18979 (2020) - [j24]Fatima Salahdine, Naima Kaabouch:
Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey. Phys. Commun. 39: 101001 (2020) - 2019
- [j23]Mohsen Riahi Manesh, Naima Kaabouch:
Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions. Comput. Secur. 85: 386-401 (2019) - [j22]Fatima Salahdine, Naima Kaabouch:
Social Engineering Attacks: A Survey. Future Internet 11(4): 89 (2019) - [j21]Youness Arjoune, Naima Kaabouch:
A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions. Sensors 19(1): 126 (2019) - 2018
- [j20]Mohsen Riahi Manesh, Naima Kaabouch:
Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Networks 70: 85-102 (2018) - [j19]Zakaria Elmrabet, Naima Kaabouch, Hassan El Ghazi, Hamid El Ghazi:
Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 67: 469-482 (2018) - [j18]Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:
A performance comparison of measurement matrices in compressive sensing. Int. J. Commun. Syst. 31(10) (2018) - [j17]Mounia Bouabdellah, Naima Kaabouch, Faissal El Bouanani, Hussain Ben-Azza:
Network layer attacks and countermeasures in cognitive radio networks: A survey. J. Inf. Secur. Appl. 38: 40-49 (2018) - [j16]Zakaria Elmrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch:
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter. J. Sens. Actuator Networks 7(3): 26 (2018) - [j15]Youness Arjoune, Naima Kaabouch:
Wideband Spectrum Sensing: A Bayesian Compressive Sensing Approach. Sensors 18(6): 1839 (2018) - 2017
- [j14]Mohsen Riahi Manesh, Sriram Subramaniam, Hector Reyes, Naima Kaabouch:
Real-time spectrum occupancy monitoring using a probabilistic model. Comput. Networks 124: 87-96 (2017) - [j13]Tarek Elderini, Naima Kaabouch, Hector Reyes:
Channel quality estimation metrics in cognitive radio networks: a survey. IET Commun. 11(8): 1173-1179 (2017) - [j12]Mohsen Riahi Manesh, Naima Kaabouch:
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system. Int. J. Crit. Infrastructure Prot. 19: 16-31 (2017) - [j11]Mohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, Wen-Chen Hu:
A Bayesian approach to estimate and model SINR in wireless networks. Int. J. Commun. Syst. 30(9) (2017) - [j10]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
A Bayesian recovery technique with Toeplitz matrix for compressive spectrum sensing in cognitive radio networks. Int. J. Commun. Syst. 30(15) (2017) - 2016
- [j9]Hector Reyes, Sriram Subramaniam, Naima Kaabouch, Wen-Chen Hu:
A spectrum sensing technique based on autocorrelation and Euclidean distance and its comparison with energy detection for cognitive radio networks. Comput. Electr. Eng. 52: 319-327 (2016) - [j8]Debabrata Ghosh, Naima Kaabouch:
A survey on image mosaicing techniques. J. Vis. Commun. Image Represent. 34: 1-11 (2016) - [j7]Debabrata Ghosh, Naima Kaabouch, Wen-Chen Hu:
A robust iterative super-resolution mosaicking algorithm using an adaptive and directional Huber-Markov regularization. J. Vis. Commun. Image Represent. 40: 98-110 (2016) - [j6]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
A survey on compressive sensing techniques for cognitive radio networks. Phys. Commun. 20: 61-73 (2016) - 2014
- [j5]Debabrata Ghosh, Naima Kaabouch, Ronald A. Fevig:
Robust Spatial-Domain Based Super-Resolution Mosaicing of CubeSat Video Frames: Algorithm and Evaluation. Comput. Inf. Sci. 7(2): 68-81 (2014) - [j4]Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, S. Hossein Mousavinezhad:
Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation. Int. J. Handheld Comput. Res. 5(1): 56-78 (2014) - [j3]Hector Reyes, Naima Kaabouch, Wen-Chen Hu:
Spectrum Channel Characterization Using Delay and Doppler Spread Parameters. J. Commun. 9(3): 234-240 (2014) - 2012
- [j2]Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, S. Hossein Mousavinezhad:
Route Anomaly Detection Using a Linear Route Representation. J. Comput. Networks Commun. 2012: 675605:1-675605:12 (2012) - 2011
- [j1]Naima Kaabouch, Yi Chen, Wen-Chen Hu, Julie W. Anderson, Forrest Ames, Rolf Paulson:
Enhancement of the asymmetry-based overlapping analysis through features extraction. J. Electronic Imaging 20(1): 013012 (2011)
Conference and Workshop Papers
- 2024
- [c82]M. Alkhatib, M. McCormick, L. Williams, A. Leon, L. Camerano, Khair Al Shamaileh, V. Devabhaktuni, Naima Kaabouch:
Classification and Source Location Indication of Jamming Attacks Targeting UAVs via Multi-output Multiclass Machine Learning Modeling. ICCE 2024: 1-5 - 2023
- [c81]Faezeh Jafari, Sattar Dorafshan, Naima Kaabouch:
Segmentation of fatigue cracks in ancillary steel structures using deep learning convolutional neural networks. AIM 2023: 872-877 - [c80]Mohammad Nayfeh, Joshua Price, M. Alkhatib, Khair Al Shamaileh, Naima Kaabouch, Vijay K. Devabhakuni:
A Real-time Machine Learning-based GPS Spoofing Solution for Location-dependent UAV Applications. eIT 2023: 289-293 - [c79]Tala Talaei Khoei, Naima Kaabouch:
ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid. eIT 2023: 333-339 - [c78]Tala Talaei Khoei, Ghilas Aissou, Khair Al Shamaileh, Vijaya Kumar Devabhaktuni, Naima Kaabouch:
Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles. eIT 2023: 340-346 - [c77]Rajrup Mitra, Amrita Das, Jack Heichel, Sattar Dorafshan, Naima Kaabouch:
A Comparative Analysis of Two Deep Learning Neural Networks for Defect Detection in Steel Structures Using UAS. eIT 2023: 430-435 - [c76]Joshua Price, Hadjar Ould Slimane, Khair Al Shamaileh, Vijay Kumar Devabhaktuni, Naima Kaabouch:
A Machine Learning Approach for the Detection of Injection Attacks on ADS-B Messaging Systems. ICNC 2023: 293-297 - 2022
- [c75]Ghilas Aissou, Selma Benouadah, Hassan El Alami, Naima Kaabouch:
Instance-based Supervised Machine Learning Models for Detecting GPS Spoofing Attacks on UAS. CCWC 2022: 208-214 - [c74]Aydan Gasimova, Tala Talaei Khoei, Naima Kaabouch:
A Comparative Analysis of the Ensemble Models for Detecting GPS Spoofing attacks on UAVs. CCWC 2022: 310-315 - [c73]Hadjar Ould Slimane, Selma Benouadah, Tala Talaei Khoei, Naima Kaabouch:
A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVs. CCWC 2022: 328-333 - [c72]Joshua Price, Yuchen Li, Khair Al Shamaileh, Quamar Niyaz, Naima Kaabouch, Vijay K. Devabhaktuni:
Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module. EIT 2022: 1-5 - [c71]Tala Talaei Khoei, Wen Chen Hu, Naima Kaabouch:
Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid. EIT 2022: 231-237 - [c70]Tala Talaei Khoei, Aydan Gasimova, Mohammad Aymane Ahajjam, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:
A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs. EIT 2022: 279-284 - [c69]Tala Talaei Khoei, Mohammad Aymane Ahajjam, Wen Chen Hu, Naima Kaabouch:
A Deep Learning Multi-Task Approach for the Detection of Alzheimer's Disease in a Longitudinal Study. EIT 2022: 315-319 - [c68]Hadjar Ould Slimane, Selma Benouadah, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:
ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques. EIT 2022: 405-410 - [c67]Rajrup Mitra, Jack Hackel, Amrita Das, Sattar Dorafshan, Naima Kaabouch:
A UAV Payload for Real-time Inspection of Highway Ancillary Structures. EIT 2022: 411-416 - [c66]Tala Talaei Khoei, Naima Kaabouch:
Densely Connected Neural Networks for Detecting Denial of Service Attacks on Smart Grid Network. UEMCON 2022: 207-211 - 2021
- [c65]David Hettich, Megan Olson, Andie Jackson, Naima Kaabouch:
Breast Cancer: Classification of Tumors Using Machine Learning Algorithms. CIVEMSA 2021: 1-6 - [c64]Tala Talaei Khoei, Ghilas Aissou, When Chen Hu, Naima Kaabouch:
Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid. EIT 2021: 129-135 - [c63]Tala Talaei Khoei, Mary Catherine Labuhn, Toro Dama Caleb, Wen Chen Hu, Naima Kaabouch:
A Stacking-based Ensemble Learning Model with Genetic Algorithm For detecting Early Stages of Alzheimer's Disease. EIT 2021: 215-222 - [c62]Jappreet Singh Gill, Mahdi Saeedi Velashani, Jordan Wolf, Jonathan Kenney, Mohsen Riahi Manesh, Naima Kaabouch:
Simulation Testbeds and Frameworks for UAV Performance Evaluation. EIT 2021: 335-341 - [c61]Tala Talaei Khoei, Shereen Ismail, Naima Kaabouch:
Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid. UEMCON 2021: 165-170 - [c60]Fatima Salahdine, Zakaria El Mrabet, Naima Kaabouch:
Phishing Attacks Detection A Machine Learning-Based Approach. UEMCON 2021: 250-255 - [c59]Shereen Ismail, Tala Talaei Khoei, Ronald Marsh, Naima Kaabouch:
A Comparative Study of Machine Learning Models for Cyber-attacks Detection in Wireless Sensor Networks. UEMCON 2021: 313-318 - [c58]Ghilas Aissou, Hadjar Ould Slimane, Selma Benouadah, Naima Kaabouch:
Tree-based Supervised Machine Learning Models For Detecting GPS Spoofing Attacks on UAS. UEMCON 2021: 649-653 - 2020
- [c57]Rabie Fadil, Andie Jackson, Badr Abou El Majd, Hassan El Ghazi, Naima Kaabouch:
Classification of Microcalcifications in Mammograms using 2D Discrete Wavelet Transform and Random Forest. EIT 2020: 353-359 - [c56]Rabie Fadil, Badr Abou El Majd, Hassan El Ghazi, Naima Kaabouch:
Breast Microcalcifications Detection using TR-MUSIC Algorithm. EIT 2020: 360-365 - [c55]Jonathan Ray Kenney, Naima Kaabouch:
Direction Finding Antenna using Rotating Radome. EIT 2020: 389-393 - [c54]Elias Ghribi, Tala Talaei Khoei, Hamed Taheri Gorji, Prakash Ranganathan, Naima Kaabouch:
A Secure Blockchain-based Communication Approach for UAV Networks. EIT 2020: 411-415 - [c53]Hamed Taheri Gorji, Tala Talaei Khoei, Naima Kaabouch:
Biomarkers Selection Toward Early Detection of Alzheimer's Disease. EIT 2020: 487-494 - [c52]Radhakrishnan Angamuthu Chinnathambi, Alex Marquette, Tyler Clark, Aaron Johnson, Daisy Flora Selvaraj, Jeff Vaughan, Todd Hanson, Scott Hanson, Prakash Ranganathan, Naima Kaabouch:
Visualizing and Predicting Culex Tarsalis Trapcounts for West Nile Virus (WNV) Disease Incidence using Machine Learning Models. EIT 2020: 581-587 - [c51]Youness Arjoune, Fatima Salahdine, Md. Shoriful Islam, Elias Ghribi, Naima Kaabouch:
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication. ICOIN 2020: 459-464 - [c50]Fatima Salahdine, Elias Ghribi, Naima Kaabouch:
Metrics for Evaluating the Efficiency of Compressing Sensing Techniques. ICOIN 2020: 562-567 - [c49]Maha Rita Arabia-Obedoza, Gloria Rodriguez, Amber Johnston, Fatima Salahdine, Naima Kaabouch:
Social Engineering Attacks A Reconnaissance Synthesis Analysis. UEMCON 2020: 843-848 - 2019
- [c48]Mohsen Riahi Manesh, Jonathan Kenney, Wen-Chen Hu, Vijaya Kumar Devabhaktuni, Naima Kaabouch:
Detection of GPS Spoofing Attacks on Unmanned Aerial Systems. CCNC 2019: 1-6 - [c47]Mounia Bouabdellah, Elias Ghribi, Naima Kaabouch:
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks. EIT 2019: 6-11 - [c46]Rabie Fadil, Andie Jackson, Badr Abou El Majd, Hassan El Ghazi, Naima Kaabouch:
Segmentation of Microcalcifications in Mammograms: A comparative Study. EIT 2019: 18-23 - [c45]Youness Arjoune, Wen-Chen Hu, Naima Kaabouch:
Chebyshev Vandermonde-like Measurement Matrix Based Compressive Spectrum Sensing. EIT 2019: 28-33 - [c44]Khaoula Belhaj Soulami, Elias Ghribi, Yassin Labyed, Mohamed Nabil Saidi, Ahmed Tamtaoui, Naima Kaabouch:
Mixed-Reality Aided System for Glioblastoma Resection Surgery using Microsoft HoloLens. EIT 2019: 79-84 - [c43]Khaoula Belhaj Soulami, Elias Ghribi, Mohamed Nabil Saidi, Ahmed Tamtaoui, Naima Kaabouch:
Breast Cancer: Segmentation of Mammograms using Invasive Weed optimization and SUSAN algorithms. EIT 2019: 85-91 - [c42]Mohsen Riahi Manesh, Mahdi Saeedi Velashani, Elias Ghribi, Naima Kaabouch:
Performance Comparison of Machine Learning Algorithms in Detecting Jamming Attacks on ADS-B0 Devices. EIT 2019: 200-206 - [c41]Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch:
A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid. EIT 2019: 298-303 - [c40]Youness Arjoune, Naima Kaabouch:
On Spectrum Sensing, a Machine Learning Method for Cognitive Radio Systems. EIT 2019: 333-338 - [c39]Paul D. Christenson, Cai Xia Yang, Naima Kaabouch:
A Low Cost Through-Wall Radar for Vital Signs Monitoring. EIT 2019: 567-571 - 2018
- [c38]Wassim Fassi Fihri, Youness Arjoune, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd:
A particle swarm optimization based algorithm for primary user emulation attack detection. CCWC 2018: 823-827 - [c37]Mohsen Riahi Manesh, Youness Arjoune, Naima Kaabouch:
A bit error rate estimation method for wireless communication systems. CCWC 2018: 835-840 - [c36]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
One-bit compressive sensing vs. multi-bit compressive sensing for cognitive radio networks. ICIT 2018: 1610-1615 - 2017
- [c35]Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:
Compressive sensing: Performance comparison of sparse recovery algorithms. CCWC 2017: 1-7 - [c34]Tarek Elderini, Naima Kaabouch, Hector Reyes:
Outage probability estimation technique based on a Bayesian model for cognitive radio networks. CCWC 2017: 1-6 - [c33]Mohsen Riahi Manesh, Adnan Quadri, Sriram Subramaniam, Naima Kaabouch:
An optimized SNR estimation technique using particle swarm optimization algorithm. CCWC 2017: 1-6 - [c32]Adnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch:
Noise cancellation in cognitive radio systems: A performance comparison of evolutionary algorithms. CCWC 2017: 1-7 - [c31]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Techniques for dealing with uncertainty in cognitive radio networks. CCWC 2017: 1-6 - [c30]Wen-Chen Hu, Naima Kaabouch, Sara Faraji Jalal Apostal, Hung-Jen Yang:
Location-aware mining for privacy-preserving location-based advertising. EIT 2017: 569-574 - [c29]Wassim Fassi Fihri, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd:
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks. ISNCC 2017: 1-6 - 2016
- [c28]Wassim Fassi Fihri, Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch:
A survey on decentralized random access MAC protocols for cognitive radio networks. ACOSIS 2016: 1-7 - [c27]Wen-Chen Hu, Hung-Jen Yang, Naima Kaabouch:
Secure spatial trajectory prediction based on traffic flows. EIT 2016: 723-727 - [c26]Mohsen Riahi Manesh, Md. Shakib Apu, Naima Kaabouch, Wen-Chen Hu:
Performance evaluation of spectrum sensing techniques for cognitive radio systems. UEMCON 2016: 1-7 - [c25]Mohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, Wen-Chen Hu:
A Bayesian model of the aggregate interference power in cognitive radio networks. UEMCON 2016: 1-7 - [c24]Adnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch:
Denoising signals in cognitive radio systems using an evolutionary algorithm based adaptive filter. UEMCON 2016: 1-6 - [c23]Hector Reyes, Sriram Subramaniam, Naima Kaabouch, Wen-Chen Hu:
A Bayesian inference method for estimating the channel occupancy. UEMCON 2016: 1-6 - [c22]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Bayesian compressive sensing with circulant matrix for spectrum sensing in cognitive radio networks. UEMCON 2016: 1-6 - 2015
- [c21]Md. Shafiul Islam, Naima Kaabouch:
Evaluation of TR-MUSIC algorithm efficiency in detecting breast microcalcifications. EIT 2015: 617-620 - [c20]Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch, Wassim Fassi Fihri:
Matched filter detection with dynamic threshold for cognitive radio networks. WINCOM 2015: 1-6 - 2013
- [c19]Wen-Chen Hu, Hung-Jen Yang, Naima Kaabouch, Lei Chen:
A novel matrix representation for privacy-preserving spatial trajectory prediction. EIT 2013: 1-7 - [c18]Md. Shafiul Islam, Naima Kaabouch, Wen-Chen Hu:
A survey of medical imaging techniques used for breast cancer detection. EIT 2013: 1-5 - 2012
- [c17]Naima Kaabouch, Deborah L. Worley, Jeremiah Neubert, Mohammad Khavanin:
Motivating and retaining engineering students by integrating real world engineering problems into the calculus courses. EDUCON 2012: 1-5 - [c16]Sangho Park, Debabrata Ghosh, Naima Kaabouch, Ronald A. Fevig, William Semke:
Hierarchical multi-level image mosaicing for autonomous navigation of UAV. Intelligent Robots and Computer Vision: Algorithms and Techniques 2012: 830116 - [c15]Mohammad S. Apu, Naima Kaabouch:
Investigation of biological effects associated with Terahertz radiation. EIT 2012: 1-5 - [c14]Mohammad S. Apu, Naima Kaabouch:
Characteristics of the Terahertz sources suitable for biomedical applications. EIT 2012: 1-5 - [c13]Debabrata Ghosh, Sangho Park, Naima Kaabouch, William Semke:
Quantitative evaluation of image mosaicing in multiple scene categories. EIT 2012: 1-6 - [c12]Kyle Foerster, Michael Mullins, Naima Kaabouch, William Semke:
Flight Testing of a Right-of-Way Compliant ADS-B-based Miniature Sense and Avoid System. Infotech@Aerospace 2012 - [c11]Michael Mullins, Kyle Foerster, Naima Kaabouch, William Semke:
Incorporating Terrain Avoidance into a Small UAS Sense and Avoid System. Infotech@Aerospace 2012 - [c10]Sangho Park, Naima Kaabouch, Ronald A. Fevig, William Semke:
Scene Classification and Landmark Spotting in Multilayer Image Mosaic for UAVs in GPS-denied Situations. Infotech@Aerospace 2012 - [c9]Hector Reyes, Naima Kaabouch, William Semke, Sean Salle:
Fuzzy Logic Method for Link Loss Detection during Unmanned Aerial Vehicle Flights. Infotech@Aerospace 2012 - 2009
- [c8]Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, Hung-Jen Yang:
Mobile Data Protection Using Handheld Usage Context Matching. Mobile Data Management 2009: 594-599 - [c7]Naima Kaabouch, Yi Chen, Julie W. Anderson, Forrest Ames, Rolf Paulson:
Asymmetry analysis based on genetic algorithms for the prediction of foot ulcers. VDA 2009: 724304 - 2008
- [c6]António dos Anjos, Hamid Reza Shahbazkia, Rita M. T. Ascenso, Naima Kaabouch:
Automatic Macroarray Analysis - Tool and Methods. CAINE 2008: 7-12 - [c5]Anlei Wang, Naima Kaabouch:
FPGA based design of a novel enhanced error detection and correction technique. EIT 2008: 25-29 - [c4]Naima Kaabouch, Hamid Reza Shahbazkia:
Automatic techniques for gridding CDNA microarray images. EIT 2008: 218-222 - 2007
- [c3]Yassin Labyed, Naima Kaabouch, Richard R. Schultz, Brij B. Singh:
Gel Electrophoresis Image Segmentation and Band Detection Based on the Derivative of the Standard Deviation. Artificial Intelligence and Pattern Recognition 2007: 31-35 - [c2]Naima Kaabouch, Richard R. Schultz, Barry Milavetz:
A Novel Automated Analysis System for DNA Gel Electrophoresis Images. Artificial Intelligence and Pattern Recognition 2007: 36-41 - [c1]Naima Kaabouch, Richard R. Schultz:
A 2-D gel electrophoresis DNA image analysis algorithm with automatic thresholding. VCIP 2007: 65081H
Data and Artifacts
- 2022
- [d1]Ghilas Aissou, Selma Benouadah, Hassan El Alami, Naima Kaabouch:
A DATASET for GPS Spoofing Detection on Autonomous Vehicles. IEEE DataPort, 2022
Informal and Other Publications
- 2022
- [i18]Fatima Salahdine, Zakaria El Mrabet, Naima Kaabouch:
Phishing Attacks Detection - A Machine Learning-Based Approach. CoRR abs/2201.10752 (2022) - [i17]Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch:
A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. CoRR abs/2207.07738 (2022) - 2020
- [i16]Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch:
A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid. CoRR abs/2001.00917 (2020) - [i15]Fatima Salahdine, Elias Ghribi, Naima Kaabouch:
Metrics for Evaluating the Efficiency of Compressing Sensing Techniques. CoRR abs/2003.07307 (2020) - [i14]Youness Arjoune, Fatima Salahdine, Md. Shoriful Islam, Elias Ghribi, Naima Kaabouch:
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication. CoRR abs/2003.07308 (2020) - 2019
- [i13]Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch:
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter. CoRR abs/1903.03684 (2019) - [i12]Fatima Salahdine, Elias Ghribi, Naima Kaabouch:
A Cooperative Spectrum Sensing Scheme Based on Compressive Sensing for Cognitive Radio Networks. CoRR abs/1912.04935 (2019) - 2018
- [i11]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Bayesian Compressive Sensing with Circulant Matrix for Spectrum Sensing in Cognitive Radio Networks. CoRR abs/1802.03457 (2018) - [i10]Zakaria Elmrabet, Hassan El Ghazi, Naima Kaabouch, Hamid El Ghazi:
Cyber-Security in Smart Grid: Survey and Challenges. CoRR abs/1809.02609 (2018) - 2017
- [i9]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Techniques for Dealing with Uncertainty in Cognitive Radio Networks. CoRR abs/1701.05468 (2017) - [i8]Mohsen Riahi Manesh, Naima Kaabouch:
Interference Modeling in Cognitive Radio Networks: A Survey. CoRR abs/1707.09391 (2017) - 2016
- [i7]Naima Kaabouch, Wen-Chen Hu, Yi Chen:
Alternative Technique to Asymmetry Analysis-Based Overlapping for Foot Ulcer Examination: Scalable Scanning. CoRR abs/1606.03578 (2016) - [i6]Naima Kaabouch, Aparna Dhirde, Saleh Faruque:
Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation. CoRR abs/1607.00588 (2016) - [i5]Naima Kaabouch, Richard R. Schultz, Barry Milavetz, Lata Balakrishnan:
An Analysis System for DNA Gel Electrophoresis Images Based on Automatic Thresholding an Enhancement. CoRR abs/1607.00589 (2016) - [i4]Sriram Subramaniam, Hector Reyes, Naima Kaabouch:
Spectrum Occupancy Measurement: An Autocorrelation based Scanning Technique using USRP. CoRR abs/1607.00590 (2016) - [i3]Hector Reyes, Sriram Subramaniam, Naima Kaabouch:
A Bayesian Network Model of the Bit Error Rate for Cognitive Radio Networks. CoRR abs/1607.00591 (2016) - [i2]Naima Kaabouch, Hamid Reza Shahbazkia:
Automatic Techniques for Gridding cDNA Microarray Images. CoRR abs/1607.00592 (2016) - [i1]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Matched filter detection with dynamic threshold for cognitive radio networks. CoRR abs/1609.08398 (2016)
Coauthor Index
aka: Vijay K. Devabhaktuni
aka: Vijay K. Devabhakuni
aka: Vijaya Kumar Devabhaktuni
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint