- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- Chaos control and synchronization
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Cellular Automata and Applications
- Complexity and Algorithms in Graphs
- Blockchain Technology Applications and Security
- Software-Defined Networks and 5G
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- Brain Tumor Detection and Classification
- Mathematical Dynamics and Fractals
- Robotic Path Planning Algorithms
- Advanced Numerical Analysis Techniques
- Autonomous Vehicle Technology and Safety
- Cloud Data Security Solutions
- Robotics and Sensor-Based Localization
- Advanced Steganography and Watermarking Techniques
- Coding theory and cryptography
- Biometric Identification and Security
- Digital and Cyber Forensics
- Internet Traffic Analysis and Secure E-voting
University of Electronic Science and Technology of China
2019-2024
Université de Lorraine
2017
Polytechnic School of Algiers
2014
Abstract The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust detection prevention mechanism for authenticated access. Blockchain is a distributed which attacker tries to hack by utilizing all resources with application enormous requests. Several methods like Rival Technique, filter modular approach so on, were developed detect prevent DDoS blockchain; still, accuracy challenging task. Hence, this research...
The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for the real-time securing communicating embedded systems interconnected in networks according Internet Things (IoT) standards. proposed platform’s Register Transfer Level (RTL) architecture entirely developed and designed from scratch using VHSIC Hardware Description Language (VHDL). original idea consists exploiting nonlinearity discretized optimized 4D Lorenz hyperchaotic system as an encryption...
Our paper presents a static obstacles avoidance and path planning method for Unmanned Aerial Vehicle (UAV) in outdoor three-dimension (3D) environment. We propose rectified rapidly exploring random tree (RRT*) algorithm where is proposed smoothing rectifying the final generated by RRT* order to reduce energy consumption during flight. also introduce an obstacle which allows efficient free-path collision generation complex 3D operating state space. This ensures that environment modeling very...
SNOW-3G is a stream cipher used by the 3GPP standards as core part of confidentiality and integrity algorithms for UMTS LTE networks. This paper proposes an enhancement regular ciphering algorithm based on HC-PRNG. The proposed scheme hyperchaotic generator which additional layer to architecture improve randomness its output keystream. objective this work achieve high security strength while maintaining standardized properties. originality new that it provides good trade-off between...
Distributed Denial of Service (DDoS) attacks are one the most significant challenges in network security, especially Software-Defined Network (SDN) environment, due to centralized management provided by Control Plane. Considering insufficiency traditional detection approaches because growth and sophistication DDoS attacks, exploiting Machine Learning (ML) techniques is high demand. For this, feature modeling essential obtain an effective ML-based system, pre-processing phase. In this paper,...
SNOW-3G is a stream cipher used by the 3GPP standards as core part of confidentiality and integrity algorithms for UMTS LTE standards. This paper proposes to combine hyperchaotic pseudo-random number generator with enhance its security level improve randomness output keystream. The new proposed approach combines perturbation technique nonlinear four-dimensional continuous chaotic system. originality this scheme that it provides good tradeoff between high security, performance hardware...
The use of rapid prototyping tools such as MATLAB Simulink and Xilinx System Generator becomes increasingly important because time-to-market constraints. In this paper, we consider for software simulation real time implementation on FPGA circuit a pseudo-random number generator (PRNG) based unified hyperchaotic system. For purpose, propose new PRNG with good randomness characteristics novel conception where parameter perturbation control to the input special function output are used in order...
The proliferation and increasing sophistication of malicious programs other security risks have been identified as the most significant problem modern cybersecurity age. Malicious software, named malware, carries out harmful operations, causing abnormal functioning, data leakage, crippling financial effects. Therefore, door is widely open for one crucial realms, so-called deep learning-based malware classification techniques, to thwart attacks. Malware's structure evolves significantly over...