default search action
Youcef Imine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Ali Haj Hassan, Youcef Imine, Antoine Gallais, Bruno Quoitin:
Detecting malicious proxy nodes during IoT network joining phase. Comput. Networks 243: 110308 (2024) - [j8]Almamy Touré, Youcef Imine, Alexis Semnont, Thierry Delot, Antoine Gallais:
A framework for detecting zero-day exploits in network flows. Comput. Networks 248: 110476 (2024) - [j7]Youssef Sellami, Youcef Imine, Antoine Gallais:
A verifiable data integrity scheme for distributed data sharing in fog computing architecture. Future Gener. Comput. Syst. 150: 64-77 (2024) - [c13]Omar el Farouk Imine, Youcef Imine, Kechar Bouabdellah:
TrackFed: An Efficient Connection Tracking Protocol for Federated Identity Management in Heterogeneous Fog Computing. WCNC 2024: 1-6 - 2023
- [j6]Antoine Marchand, Youcef Imine, Hamza Ouarnoughi, Titouan Tarridec, Antoine Gallais:
Firmware Integrity Protection: A Survey. IEEE Access 11: 77952-77979 (2023) - [j5]Ali Haj Hassan, Youcef Imine, Antoine Gallais, Bruno Quoitin:
Consensus-based mutual authentication scheme for Industrial IoT. Ad Hoc Networks 145: 103162 (2023) - [j4]Youcef Imine, Hicham Lakhlef, Michel Raynal, François Taïani:
DMCSC: a fully distributed multi-coloring approach for scalable communication in synchronous broadcast networks. J. Supercomput. 79(1): 788-813 (2023) - [c12]Sofiane Bouaziz, Hadjer Benmeziane, Youcef Imine, Leila Hamdad, Smaïl Niar, Hamza Ouarnoughi:
FLASH-RL: Federated Learning Addressing System and Static Heterogeneity using Reinforcement Learning. ICCD 2023: 444-447 - [c11]Almamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont, Robin Giraudo:
Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe. SEC 2023: 191-206 - [i1]Sofiane Bouaziz, Hadjer Benmeziane, Youcef Imine, Leila Hamdad, Smaïl Niar, Hamza Ouarnoughi:
FLASH-RL: Federated Learning Addressing System and Static Heterogeneity using Reinforcement Learning. CoRR abs/2311.06917 (2023) - 2022
- [j3]Djamel Eddine Kouicem, Youcef Imine, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 19(2): 1292-1306 (2022) - [c10]Ali Haj Hassan, Youcef Imine, Antoine Gallais, Bruno Quoitin:
Zero-Touch Mutual Authentication Scheme for 6TiSCH Industrial IoT Networks. IWCMC 2022: 354-359 - [c9]Youcef Imine, Antoine Gallais, Yacine Challal:
An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture. SoftCOM 2022: 1-6 - [c8]Youssef Sellami, Youcef Imine, Antoine Gallais:
An Efficient Data Integrity Verification Scheme For Distributed Fog Computing Architecture. WiMob 2022: 251-256 - 2020
- [j2]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
An accountable privacy-preserving scheme for public information sharing systems. Comput. Secur. 93: 101786 (2020) - [c7]Sally Ismail, Fabio D'Andreagiovanni, Hicham Lakhlef, Youcef Imine:
Recent Advances on 5G Resource Allocation Problem using PD-NOMA. ISNCC 2020: 1-7 - [c6]Michaël Mahamat, Hicham Lakhlef, Ahmed Lounis, Youcef Imine:
Optimal Time Slot Allocation for Communicating Things Using Local Clocks. SoftCOM 2020: 1-6
2010 – 2019
- 2019
- [b1]Youcef Imine:
Cloud computing security. (La sécurité du cloud computing). University of Technology of Compiègne, France, 2019 - [c5]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
An Efficient Accountable Privacy-Preserving Scheme for Public Information Sharing in Fog Computing. GLOBECOM 2019: 1-6 - [c4]Hicham Lakhlef, Youcef Imine, Abdelmadjid Bouabdallah:
A Distributed Collision-free Distance-2 Coloring Algorithm for Ring Networks. SoftCOM 2019: 1-6 - 2018
- [j1]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
Revocable attribute-based access control in mutli-autority systems. J. Netw. Comput. Appl. 122: 61-76 (2018) - [c3]Youcef Imine, Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Ahmed Lounis:
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. TrustCom/BigDataSE 2018: 608-613 - 2017
- [c2]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
ABR: A new efficient attribute based revocation on access control system. IWCMC 2017: 735-740 - [c1]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control. TrustCom/BigDataSE/ICESS 2017: 33-40
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint