Mohamed Amine Ben Farah

ORCID: 0000-0002-0135-9942
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Video Surveillance and Tracking Methods
  • Gait Recognition and Analysis
  • Information and Cyber Security
  • Human Pose and Action Recognition
  • Advanced Steganography and Watermarking Techniques
  • Chaos control and synchronization
  • Network Security and Intrusion Detection
  • Face recognition and analysis
  • Adversarial Robustness in Machine Learning
  • Cryptographic Implementations and Security
  • Fractal and DNA sequence analysis
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Smart Grid Security and Resilience
  • Cellular Automata and Applications
  • Maritime Transport Emissions and Efficiency
  • Digital Media Forensic Detection
  • Maritime Security and History
  • Maritime Navigation and Safety
  • Generative Adversarial Networks and Image Synthesis
  • Infant Health and Development
  • Image and Video Stabilization
  • Cybersecurity and Information Systems
  • Bluetooth and Wireless Communication Technologies

Birmingham City University
2022-2024

University of Sfax
2010-2021

University of Strathclyde
2020-2021

Information Technology Laboratory
2019

The paper presents a classification of cyber attacks within the context state art in maritime industry. A systematic categorization vessel components has been conducted, complemented by an analysis key services delivered ports. vulnerabilities Global Navigation Satellite System (GNSS) have given particular consideration since it is critical subcategory many infrastructures and, consequently, target for attacks. Recent research confirms that dramatic proliferation crimes fueled increased...

10.3390/info13010022 article EN cc-by Information 2022-01-06

Blockchain technology has emerged as a potential solution to address the imperative need for enhancing security, transparency, and efficiency in maritime industry, where increasing reliance on digital systems data prevails. However, integration of blockchain sector is still an underexplored territory, necessitating comprehensive investigation into its impact, challenges, implementation strategies harness transformative effectively. This survey paper investigates impact Maritime Supply Chain...

10.1016/j.future.2024.03.046 article EN cc-by Future Generation Computer Systems 2024-04-08

In this manuscript we present a novel method to design strong substitution Boxes based on chaos function and genetic algorithm techniques. Furthermore, analyse the strength of proposed S-Boxes. The methodology is analyzed tested for following criteria: bijective property, nonlinearity, strict avalanche criterion, output bits independence criterion equiprobable input/output XOR distribution. Numerical simulation security analysis demonstrate that scheme practical in image encryption.

10.1109/aiccsa.2014.7073265 article EN 2014-11-01

Chaos-based communication can be applied advantageously only if the property of chaotic systems is suitably exploited. Chaos has been studied for a little more than decade while traditional schemes have developed nearly century. The hope was (and still is) that some application will prove to better communication. Yet, after one research, in most cases chaos did not take place schemes. As far as efficiency concerned, are typically less efficient their counterpart. Still, main advantage...

10.1109/dtis.2006.1708656 article EN 2006-01-01

In this manuscript we present a novel method to design strong substitution box having important cryptographic properties. Our is based on chaos and take into account that an S-box can be viewed as set of Boolean functions. Therefore, will advantage the different characteristics chaotic functions generate random with high nonlinearity. Using these functions, create highly nonlinear S-box. Afterwards, proposed methodology analyzed tested for following criteria: bijective property,...

10.1109/ssd.2015.7348106 article EN 2015-03-01

10.1016/j.cnsns.2010.09.005 article EN Communications in Nonlinear Science and Numerical Simulation 2010-09-16

The maritime industry is facing an escalating concern of cybersecurity threats, which can be attributed to the rapid growth digital technologies and recent adoption autonomous semi-autonomous shipping. To address this issue, various published papers have proposed cyberattack scenarios aiming increase awareness enhance security systems. This research aims assess threats in sector by presenting three practical their corresponding risks mitigation strategies. first scenario involves associated...

10.1109/csr57506.2023.10224972 article EN 2023-07-31

In this paper we have proposed an image crypto-compression system that guarantees a secure storage and transfer while preserving the performance of used compression method. Regarding compression, chosen to use discrete cosine transformation (DCT), Huffman coding RLE because their efficiency in most current cryptocompression systems. As for encryption, made choice chaos its good cryptographic properties. Experimental results confirm our is efficient, greatly improve ratio maintaining...

10.1109/setit.2012.6481939 article EN 2012-03-01

Pedestrian detection has many applications in computer vision including robotics, scene understanding, person reidentification and video-surveillance system. In fact, the process of aims to detect localize each images, represented via bounding boxes. Recent deep learning pedestrian detectors, which are hybrid methods that combines traditional hand-crafted features convolutional such as Fast/Faster Region based-CNN (R-CNN), have shown excellent performance for general object detection. this...

10.1109/sta.2019.8717226 article EN 2019-03-01

Although a large and fast-growing workforce for qualified cybersecurity professionals exists, developing certification framework has to overcome many challenges. Towards this end, an extended review of the certifications offered currently on market from 9 major issuing companies is conducted. Moreover, guidelines definition as they are provided recent Cyber Security Act ENISA, NIST ISO/IEC 17024 covered. A vast comparison among presented given, based not only domain covered but also required...

10.1109/csr51186.2021.9527974 article EN 2021-07-26

Poisoning attacks are a primary threat to machine learning models, aiming compromise their performance and reliability by manipulating training datasets. This paper introduces novel attack - Outlier-Oriented (OOP) attack, which manipulates labels of most distanced samples from the decision boundaries. The also investigates adverse impact such on different algorithms within multiclass classification scenario, analyzing variance correlation between poisoning levels degradation. To ascertain...

10.48550/arxiv.2411.00519 preprint EN arXiv (Cornell University) 2024-11-01
Coming Soon ...