default search action
Imen Bouazzi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Sidra Abbas, Imen Bouazzi, Stephen Ojo, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Abdullah Al Hejaili, Zuzana Stolicna:
Improving Smart Grids Security: An Active Learning Approach for Smart Grid-Based Energy Theft Detection. IEEE Access 12: 1706-1717 (2024) - [j12]Hisham Alghamdi, Safeer Ullah, Ammar Ali, Ghulam Hafeez, Lyu Guanghua, Ameen Ullah, Imen Bouazzi:
Variable-Gain Robust Exact Differentiator-Based Neuro-Adaptive Control Design for Dynamic Wind Power Optimization. IEEE Access 12: 2186-2197 (2024) - [j11]Sidra Abbas, Stephen Ojo, Imen Bouazzi, Gabriel Avelino R. Sampedro, Abdullah Al Hejaili, Ahmad S. Almadhor, Rastislav Kulhanek:
Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack Detection. IEEE Access 12: 138904-138920 (2024) - [j10]Sidra Abbas, Imen Bouazzi, Gabriel Avelino R. Sampedro, Shtwai Alsubai, Ahmad S. Almadhor, Abdullah Al Hejaili, Natalia Kryvinska:
Active-Darknet: An Iterative Learning Approach for Darknet Traffic Detection and Categorization. IEEE Access 12: 151987-151997 (2024) - [j9]Sidra Abbas, Imen Bouazzi, Stephen Ojo, Abdullah Al Hejaili, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Michal Gregus:
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. PeerJ Comput. Sci. 10: e1793 (2024) - [j8]Sher Ali, Muhammad Abul Hassan, Fabrizio Granelli, Wei Wang, Gabriel Avelino R. Sampedro, Abdullah Al Hejaili, Imen Bouazzi:
Optimizing Multi-Tier Cellular Networks With Deep Learning for 6G Consumer Electronics Communications. IEEE Trans. Consumer Electron. 70(1): 627-634 (2024) - [j7]Sidra Abbas, Shtwai Alsubai, Stephen Ojo, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Abdullah Al Hejaili, Imen Bouazzi:
An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment. J. Supercomput. 80(10): 13557-13575 (2024) - [c2]Monji Zaidi, Imen Bouazzi:
A novel hardware-based technique for wireless sensor networks balancing power consumption with error location. ATSIP 2024: 50-54 - [c1]Imen Bouazzi, Monji Zaidi:
Indoor signal fuzzy modeling for wireless sensor mobility control in critical corner effect situations. ATSIP 2024: 55-58 - 2022
- [j6]Monji Zaidi, Imen Bouazzi, Mohammed Usman, Mohammed Zubair M. Shamim, Ninni Singh, Vinit Kumar Gunjan:
Cooperative Scheme ToA-RSSI and Variable Anchor Positions for Sensors Localization in 2D Environments. Complex. 2022: 5069254:1-5069254:11 (2022) - [j5]Monji Zaidi, Imen Bouazzi, Mohammed Ibrahim Al-Rayif, Mohammed Zubair M. Shamim, Mohammed Usman:
Low power hardware design and its mathematical modeling for fast-exact geolocalization system in wireless networks. Int. J. Commun. Syst. 35(9) (2022) - 2021
- [j4]Imen Bouazzi, Monji Zaidi, Mohammed Usman, Mohammed Zubair M. Shamim:
A new medium access control mechanism for energy optimization in WSN: traffic control and data priority scheme. EURASIP J. Wirel. Commun. Netw. 2021(1): 42 (2021)
2010 – 2019
- 2018
- [j3]Imen Bouazzi, Jamila Bhar, Mohamed Atri:
A Dynamic Adaptation Mechanism for Traffic Conditions in Wireless Sensor Network. Wirel. Pers. Commun. 101(4): 1967-1982 (2018) - 2017
- [j2]Imen Bouazzi, Jamila Bhar, Mohamed Atri:
Priority-based queuing and transmission rate management using a fuzzy logic controller in WSNs. ICT Express 3(2): 101-105 (2017) - [j1]Imen Bouazzi, Jamila Bhar, Mohamed Atri:
New CSMA/CA prioritisation based on fuzzy control mechanism. Int. J. Intell. Eng. Informatics 5(3): 253-266 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint