Search

Your search keyword '"Mekdad, Yassine"' showing total 20 results

Search Constraints

Start Over You searched for: Author "Mekdad, Yassine" Remove constraint Author: "Mekdad, Yassine"
20 results on '"Mekdad, Yassine"'

Search Results

1. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

2. On the Robustness of Image-Based Malware Detection Against Adversarial Attacks

3. Cryptocurrency wallets: assessment and security

4. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

5. Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

6. Real or Virtual: A Video Conferencing Background Manipulation-Detection System

7. Detecting High-Quality GAN-Generated Face Images using Neural Networks

8. Demystifying the Transferability of Adversarial Attacks in Computer Networks

9. A Survey on Security and Privacy Issues of UAVs

12. The Rise of ICS Malware: A Comparative Analysis

15. A comprehensive security and performance assessment of UAV authentication schemes.

Catalog

Books, media, physical & digital resources