


default search action
Bassem Ouni
Person information
- affiliation: University of Nice Sophia Antipolis, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Osama Wehbi, Sarhad Arisdakessian
, Mohsen Guizani
, Omar Abdel Wahab
, Azzam Mourad
, Hadi Otrok
, Hoda Alkhzaimi, Bassem Ouni
:
Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities. IEEE Internet Things J. 12(3): 3105-3117 (2025) - [j10]Venkatraman Balasubramanian, Moayad Aloqaily, Mohsen Guizani, Bassem Ouni:
Security Challenges and Solutions for Autonomous Vehicles and Drones in the AI Age. IEEE Internet Things Mag. 8(2): 129-136 (2025) - [i13]Nandish Chattopadhyay, Abdul Basit, Bassem Ouni, Muhammad Shafique:
A Survey of Adversarial Defenses in Vision-based Systems: Categorization, Methods and Challenges. CoRR abs/2503.00384 (2025) - [i12]Amira Guesmi, Bassem Ouni, Muhammad Shafique:
Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs. CoRR abs/2503.07058 (2025) - 2024
- [j9]Amira Guesmi
, Muhammad Abdullah Hanif, Bassem Ouni
, Muhammad Shafique
:
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation. IEEE Access 12: 13571-13585 (2024) - [j8]Ammar Kamal Abasi
, Moayad Aloqaily
, Mohsen Guizani, Bassem Ouni:
Metaheuristic Algorithms for 6G wireless communications: Recent advances and applications. Ad Hoc Networks 158: 103474 (2024) - [j7]Neveen Mohammad Hijazi
, Moayad Aloqaily
, Mohsen Guizani
, Bassem Ouni
, Fakhri Karray
:
Secure Federated Learning With Fully Homomorphic Encryption for IoT Communications. IEEE Internet Things J. 11(3): 4289-4300 (2024) - [c18]Nandish Chattopadhyay
, Amira Guesmi
, Muhammad Abdullah Hanif
, Bassem Ouni
, Muhammad Shafique
:
Defending against Adversarial Patches using Dimensionality Reduction. DAC 2024: 222:1-222:6 - [c17]Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani
, Bassem Ouni, Muhammad Shafique
:
SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications. IROS 2024: 2786-2793 - [c16]Maryam Alghfeli, Latif U. Khan, Mohsen Guizani, Bassem Ouni:
A Joint Sensing, Communication, and Task Offloading Framework for Vehicular Metaverse. WCNC 2024: 1-6 - [c15]Muhammad Asad, Safa Otoum, Bassem Ouni:
Federated Learning in Vehicular Networks: A Review of Emerging Trends and Future Directions. WF-IoT 2024: 1-6 - [c14]Rabiah Al-qudah
, Neveen Mohammad Hijazi, Moayad Aloqaily, Mohsen Guizani, Bassem Ouni:
Federated Learning Security: An Incremental Distributed Attack Approach. WF-IoT 2024: 765-771 - [i11]Amira Guesmi
, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique:
SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications. CoRR abs/2403.11515 (2024) - [i10]Osama Wehbi, Sarhad Arisdakessian, Mohsen Guizani, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Alkhzaimi, Bassem Ouni:
Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities. CoRR abs/2405.00394 (2024) - [i9]Amira Guesmi, Bassem Ouni, Muhammad Shafique:
Exploring the Robustness and Transferability of Patch-Based Adversarial Attacks in Quantized Neural Networks. CoRR abs/2411.15246 (2024) - 2023
- [j6]Amira Guesmi
, Muhammad Abdullah Hanif, Bassem Ouni
, Muhammad Shafique
:
Physical Adversarial Attacks for Camera-Based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook. IEEE Access 11: 109617-109668 (2023) - [c13]Ammar Kamal Abasi, Moayad Aloqaily, Bassem Ouni, Maher Hamdi:
Optimization of CNN-based Federated Learning for Cyber-Physical Detection. CCNC 2023: 1-6 - [c12]Latif U. Khan, Mohsen Guizani, Bassem Ouni, Mohamed Adel Serhani:
Joint Association and Computing Resource Optimization for Distributed Wireless Metaverse. CiSt 2023: 531-535 - [c11]Belsabel Teklemariam, Saron Bokretsion, Safa Otoum, Bassem Ouni:
On the Viability of Federated Deep Autoencoder for Botnet Threat Detection. DASC/PiCom/CBDCom/CyberSciTech 2023: 1-6 - [c10]Rabiah Al-qudah
, Moayad Aloqaily, Bassem Ouni, Mohsen Guizani, Thierry Lestable:
An Incremental Gray-Box Physical Adversarial Attack on Neural Network Training. ICC 2023: 45-50 - [c9]Neveen Hijazi, Moayad Aloqaily, Bassem Ouni, Fakhri Karray, Mérouane Debbah:
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments. ICC 2023: 3169-3174 - [c8]Mounia Hamidouche
, Eugeny Popko
, Bassem Ouni
:
Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning. IoT 2023: 105-112 - [c7]Ammar Kamal Abasi, Moayad Aloqaily, Bassem Ouni, Mohsen Guizani, Mérouane Debbah, Fakhri Karray:
A Survey on Securing 6G Wireless Communications based Optimization Techniques. IWCMC 2023: 216-223 - [i8]Neveen Hijazi, Moayad Aloqaily, Bassem Ouni, Fakhri Karray, Mérouane Debbah:
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments. CoRR abs/2302.12205 (2023) - [i7]Rabiah Al-qudah
, Moayad Aloqaily, Bassem Ouni, Mohsen Guizani, Thierry Lestable:
An Incremental Gray-box Physical Adversarial Attack on Neural Network Training. CoRR abs/2303.01245 (2023) - [i6]Amira Guesmi
, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation. CoRR abs/2308.03108 (2023) - [i5]Amira Guesmi
, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique:
Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook. CoRR abs/2308.06173 (2023) - [i4]Nandish Chattopadhyay, Amira Guesmi
, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches. CoRR abs/2311.12084 (2023) - [i3]Nandish Chattopadhyay, Amira Guesmi
, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction. CoRR abs/2311.12211 (2023) - [i2]Mounia Hamidouche, Eugeny Popko, Bassem Ouni:
Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning. CoRR abs/2312.00034 (2023) - [i1]Julien S. Jainsky, David Naccache, Bassem Ouni, Ofer Yifrach-Stav:
Authenticating Medications with QR-Codes and Compact Digital Signatures. IACR Cryptol. ePrint Arch. 2023: 1817 (2023) - 2022
- [j5]Fadhila Tlili
, Lamia Chaari Fourati
, Samiha Ayed
, Bassem Ouni
:
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures. Ad Hoc Networks 129: 102805 (2022) - [c6]Fadhila Tlili, Samiha Ayed, Lamia Chaari, Bassem Ouni:
Artificial Intelligence Based Approach for Fault and Anomaly Detection Within UAVs. AINA (1) 2022: 297-308 - [c5]Dev Patel, Dhairya Jadav, Rajesh Gupta
, Nilesh Kumar Jadav
, Sudeep Tanwar, Bassem Ouni, Mohsen Guizani:
Deep Learning and Blockchain-based Framework to Detect Malware in Autonomous Vehicles. IWCMC 2022: 278-283 - 2021
- [j4]Bassem Ouni
, Christophe Aussaguès, Saadia Dhouib
, Chokri Mraidha
:
Model-Driven Architectural Framework towards Safe and Secure Nuclear Power Reactors. Sensors 21(15): 5136 (2021)
2010 – 2019
- 2017
- [j3]Bassem Ouni, Imen Mhedbi, Chiraz Trabelsi
, Rabie Ben Atitallah, Cécile Belleudy:
Multi-level energy/power-aware design methodology for MPSoC. J. Parallel Distributed Comput. 100: 203-215 (2017) - 2013
- [b1]Bassem Ouni:
High-level energy characterization, modeling and estimation for OS-based platforms. (Caractérisation, modélisation et estimation de la consommation d'énergie à haut-niveau des OS embarqués). University of Nice Sophia Antipolis, France, 2013 - [j2]Ikbel Belaid, Bassem Ouni, Fabrice Muller, Maher Benjemaa:
Complete and Approximate Methods for Off-Line Placement of Hardware Tasks on Reconfigurable Devices. J. Circuits Syst. Comput. 22(2) (2013) - 2012
- [j1]Bassem Ouni, Cécile Belleudy, Eric Senn:
Accurate energy characterization of OS services in embedded systems. EURASIP J. Embed. Syst. 2012: 6 (2012) - [c4]Bassem Ouni, Cécile Belleudy, Eric Senn:
Energy Characterization and Classification of Embedded Operating System Services. DSD 2012: 684-691 - [c3]Bassem Ouni, Cécile Belleudy, Eric Senn:
Realistic energy modeling of scheduling, interprocess-communication and context switch routines. DTIS 2012: 1-6 - 2011
- [c2]Bassem Ouni, Cécile Belleudy, Sébastien Bilavarn, Eric Senn:
Embedded operating systems energy overhead. DASIP 2011: 52-57 - [c1]Bassem Ouni, Ikbel Belaid, Fabrice Muller, Maher Benjemaa:
Placement of Hardware Tasks on FPGA using the Bees Algorithm. PECCS 2011: 498-505
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-08 01:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint