Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Maleh, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.01345  [pdf

    cs.CL cs.LG

    Enhancing Bangla Fake News Detection Using Bidirectional Gated Recurrent Units and Deep Learning Techniques

    Authors: Utsha Roy, Mst. Sazia Tahosin, Md. Mahedi Hassan, Taminul Islam, Fahim Imtiaz, Md Rezwane Sadik, Yassine Maleh, Rejwan Bin Sulaiman, Md. Simul Hasan Talukder

    Abstract: The rise of fake news has made the need for effective detection methods, including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models have been tested on this dataset, including the bidir… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted for publication in the 7th International Conference on Networking, Intelligent Systems & Security. The conference Proceedings will be published by ACM International Conference Proceeding Series (ICPS) ISBN N°: 979-8-4007-0019-4. 8 pages, 11 figures

  2. arXiv:1701.00401  [pdf

    cs.CR

    Study and Development of a Symmetric protocol to secure communications in WSN

    Authors: Yassine Maleh, Abdellah Ezzati

    Abstract: Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly… ▽ More

    Submitted 2 January, 2017; originally announced January 2017.

    Comments: in French

  3. arXiv:1701.00159  [pdf

    cs.CR cs.NI

    Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks

    Authors: Yassine Maleh, Abdellah Ezzati

    Abstract: Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. However, the limited resources of sensors and hostile environments in which they could be deployed, make this type of networks vulnerable to several types of attacks similar to those occurring in ad hoc networks. The most cru… ▽ More

    Submitted 31 December, 2016; originally announced January 2017.

    Comments: 6 pages, 5 figures, Advanced Information Technology, Services and Systems (AIT2S) Conference 2015

  4. arXiv:1609.05323  [pdf

    cs.CR

    An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks

    Authors: Yassine Maleh, Abdellah Ezzati

    Abstract: Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly… ▽ More

    Submitted 17 September, 2016; originally announced September 2016.

    Comments: 9 pages, 5 figures, Mediterranean Telecommunications Journal, Vol. 6, N° 2, June 2016

  5. arXiv:1401.1982  [pdf

    cs.CR cs.NI

    A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks

    Authors: Y. Maleh, A. Ezzati

    Abstract: Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioni… ▽ More

    Submitted 9 January, 2014; originally announced January 2014.

    Comments: 12 pages with 9 figures

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013